{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "olm.targetNamespaces": "",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "17507",
                "uid": "c6e7090d-f7b4-4770-a637-9b0d585e9311"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "cert-manager-operator",
                "resourceVersion": "16919",
                "uid": "5a1a5016-39f1-4345-88a6-3b96c639b187"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19530",
                "uid": "43cbc796-ab1a-42ac-94c8-0f0f214843f7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19730",
                "uid": "ffa7169d-4a2e-4a9a-8592-7b9887ebf7b2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "cert-manager",
                "resourceVersion": "18493",
                "uid": "8c1c3cf0-3ca7-4e7e-a50d-e8eb972f4c62"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:12:13Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "cert-manager",
                "resourceVersion": "17785",
                "uid": "ff3c49bc-005e-4ebe-b111-a91aba81d5fb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "cert-manager",
                "resourceVersion": "19740",
                "uid": "47b93294-c82d-4b6b-9cd8-10edf2ed7e02"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "cert-manager",
                "resourceVersion": "19626",
                "uid": "f038bf19-e6fa-45ff-967d-295a707894f9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "dedicated-admin",
                "resourceVersion": "18149",
                "uid": "217ba7e7-d886-4086-9f43-19e966827a6c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "dedicated-admin",
                "resourceVersion": "16774",
                "uid": "fbb10bed-33ef-416e-a671-1d808465004f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "dedicated-admin",
                "resourceVersion": "19507",
                "uid": "160b7b7f-c027-4662-98b9-7598388c1ea8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "dedicated-admin",
                "resourceVersion": "19701",
                "uid": "c7041281-295d-4a6e-9610-471b023c9789"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "default",
                "resourceVersion": "18449",
                "uid": "e048add1-b1fd-46dd-b4e4-602399beebc6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "default",
                "resourceVersion": "17027",
                "uid": "4d69347e-073b-4768-a8dc-5a9940f24b2e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "default",
                "resourceVersion": "19706",
                "uid": "1c247b56-e4ce-4cf0-a6d6-1494ce2295d7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "default",
                "resourceVersion": "19874",
                "uid": "f3e00875-c9a3-4cf9-a8e8-899e4a0eeef2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "konflux-operator",
                "resourceVersion": "18167",
                "uid": "3a155068-929a-4fa7-95bb-768f929e9b42"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operators.coreos.com/konflux-operator.konflux-operator": ""
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "konflux-operator",
                "resourceVersion": "17192",
                "uid": "54e74047-5306-42b6-97d2-81eaf2968fc3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "konflux-operator",
                "resourceVersion": "19523",
                "uid": "19ed7c4e-5d75-4092-8df8-a1112ab22333"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "konflux-operator",
                "resourceVersion": "19718",
                "uid": "6b2a855e-3efa-4e40-881d-70d21bbdce67"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "konflux-ui",
                "resourceVersion": "18370",
                "uid": "ea4abf09-28c1-4383-b87e-32071de3698d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "konflux-ui",
                "resourceVersion": "16982",
                "uid": "b187b81b-692f-4d6c-b1f3-3df2a2e101b4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "konflux-ui",
                "resourceVersion": "19682",
                "uid": "d3d80c66-be53-47dd-be9d-503b4d7cbb2e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "konflux-ui",
                "resourceVersion": "19858",
                "uid": "26925063-f007-44b3-9ef5-b2808c719b12"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-node-lease",
                "resourceVersion": "18378",
                "uid": "be1108e0-bd73-4f66-bcd7-241c0da8d23d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-node-lease",
                "resourceVersion": "16983",
                "uid": "daeaca67-38e4-4c4a-a301-d21e95d11900"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:30Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-node-lease",
                "resourceVersion": "19684",
                "uid": "af921fa0-d6ac-4ff5-9851-c0f8de25698b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-node-lease",
                "resourceVersion": "19863",
                "uid": "ee36ef71-810f-4c38-9aaa-71c5ce9c69fd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-public",
                "resourceVersion": "18063",
                "uid": "12ea8e59-a9ae-4d61-af6f-f16de73202e2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-public",
                "resourceVersion": "17130",
                "uid": "61a6b643-185c-4ce8-a915-e02ecafde1ab"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-public",
                "resourceVersion": "19768",
                "uid": "8926782f-8f38-49d3-9b30-6f719afe6359"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-public",
                "resourceVersion": "19666",
                "uid": "319d0668-d8ea-4c29-b421-a1012cc6d7f8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-system",
                "resourceVersion": "18300",
                "uid": "cf6feb21-782c-4544-bfc4-0cf30d408fe7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-system",
                "resourceVersion": "16956",
                "uid": "7049f9be-ba21-4bae-bbb0-19f484584552"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-system",
                "resourceVersion": "19564",
                "uid": "6ca8977e-a5ea-4041-9ecf-e53ec67fdbd2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-system",
                "resourceVersion": "19769",
                "uid": "85c3c498-ee96-44a7-9361-89cfa0056849"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "open-cluster-management-2peb42nlhreqhm7gegjie4h8sih13gfv",
                "resourceVersion": "18263",
                "uid": "3d5bdd40-7dff-40d6-a9af-1e9cae16dd85"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "open-cluster-management-2peb42nlhreqhm7gegjie4h8sih13gfv",
                "resourceVersion": "16944",
                "uid": "fec97e57-dbaf-4501-a40e-634b4ba4fbf4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "open-cluster-management-2peb42nlhreqhm7gegjie4h8sih13gfv",
                "resourceVersion": "19540",
                "uid": "81f4bc68-a010-4ca1-b65c-16264df449a2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "open-cluster-management-2peb42nlhreqhm7gegjie4h8sih13gfv",
                "resourceVersion": "19749",
                "uid": "8e3ba179-cb5b-4f90-aa61-68eac31a0b23"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "18317",
                "uid": "f9b131b0-9b7c-4246-b6ef-521915c3bfcc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "16965",
                "uid": "7c99e155-c01d-41b4-9e5f-76e43d1210e8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "19609",
                "uid": "f3515c8e-1d83-4ee7-8c60-a06e6052a9ea"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "19781",
                "uid": "20e36d93-0f12-4fae-8e9a-7b9eee517512"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "18095",
                "uid": "f62b4440-6fb4-405e-b4f7-9f4ac81b7f91"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "16703",
                "uid": "db41b274-c20f-4b7b-846a-94e859b85df9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "19786",
                "uid": "4aae6910-8ea1-4ef1-b0e3-cb3f7e7ca88a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "19686",
                "uid": "6133d744-1b9b-4796-83d4-228b1340a208"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "18460",
                "uid": "be51cd45-397c-4b4a-9b64-f3b3ff6c8105"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-apiserver",
                "resourceVersion": "17038",
                "uid": "10f86f95-c905-4ca0-b6d6-17808aaae028"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-apiserver",
                "resourceVersion": "19717",
                "uid": "fd5d2d8e-e443-4fc9-aba7-81195601fcba"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-apiserver",
                "resourceVersion": "19562",
                "uid": "25eaf46a-27c0-4781-a5a2-f5fea5c5d71c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "18320",
                "uid": "70724a4e-ce31-40fe-991d-b9613d1ba247"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "16966",
                "uid": "05cdf251-ecbf-4b48-a88a-55c7415051bc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "19623",
                "uid": "4c910b69-8268-4aa6-992c-7c7a4862a16a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "19783",
                "uid": "4074087b-929e-448b-af46-b760a802d777"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-authentication",
                "resourceVersion": "18499",
                "uid": "aa2175d1-d5ac-4a6f-9f89-85d692f22d4b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-authentication",
                "resourceVersion": "17103",
                "uid": "31b4e68f-27c8-432c-8bd5-f44fe3703f9f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-authentication",
                "resourceVersion": "19751",
                "uid": "c034f200-21bb-48c1-a6f5-0a3c00a44c98"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-authentication",
                "resourceVersion": "19639",
                "uid": "9a20718f-4298-49ac-821b-f88c5dc1a5a6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "18431",
                "uid": "a2b6f989-5482-4fec-b536-cad83b0d7cda"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "17009",
                "uid": "ee5667a0-5538-44d5-a879-658d0ab85aca"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "19699",
                "uid": "aab04af0-5c79-4669-ad67-ec57ea185480"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "19871",
                "uid": "62015b4f-39ba-4a81-a111-4a27bd453b4f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "18507",
                "uid": "4d0f5aa8-c577-4937-9a00-e6f9717dba0f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "17112",
                "uid": "b9996f03-ad1b-4007-aa85-7d06326f71f2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "19756",
                "uid": "a9c0acfb-8f9d-41e7-97f6-8f24c2048516"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "19650",
                "uid": "bd628771-4717-4b06-9753-261e08d04b03"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "18229",
                "uid": "566fd775-1925-4b1e-9601-fd78c79a6076"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "16909",
                "uid": "0de94fa0-0487-4bc0-a7b1-3214feae2162"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "19529",
                "uid": "1ffb77aa-e522-403d-8bb8-eb5a73efee6d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "19728",
                "uid": "a84850cb-9f3e-4833-a6d4-65e9599b0254"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "18480",
                "uid": "8012fff7-e6c4-4f0d-8798-af6663ddd654"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "17076",
                "uid": "20ccd0a0-2652-4d8a-ab98-ef48629b368d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "19729",
                "uid": "e06be70f-3679-4bf5-af62-d1d806335e00"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "19585",
                "uid": "edbdcea4-d6fd-427f-8a8f-79560cf6e489"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "18276",
                "uid": "95b51125-7230-4e48-8d0a-61a0b93bb310"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "16947",
                "uid": "1d915f39-9470-4e0d-aa09-5b20ae24485d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "19548",
                "uid": "c859573b-acab-4ed9-b17f-b68a71af362b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "19754",
                "uid": "96d61428-19e7-4a64-8dc8-aa6d839f178c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "18360",
                "uid": "fb8fe961-a320-4dcf-bf5b-fe85a09fd07a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "16979",
                "uid": "9155ed99-939b-41d7-9545-4368f26f053b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "19673",
                "uid": "e64498ad-0b0c-4783-b216-a6da110da388"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "19846",
                "uid": "3d4a9a0f-e6b7-4c5d-b759-a97afaaacaea"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "18503",
                "uid": "f3da14c1-812f-440d-9ee0-70819ce35fea"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "17107",
                "uid": "a931509e-61ab-4700-9b79-b422ddbb67f1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "19753",
                "uid": "0f57e4fc-0285-41aa-892a-acb05132cee6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "19645",
                "uid": "f4095d6a-3f32-427b-8c8d-b1829babdf94"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "18288",
                "uid": "2bb9887e-e02f-4e94-9277-db11c6a89db1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "16953",
                "uid": "22654437-e04f-42d9-8311-93bfb888db71"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "19559",
                "uid": "d08047e9-f395-4b6e-9821-4e9dbb4b515f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "19765",
                "uid": "c6970b28-54b2-4107-b26c-a78d84cd7526"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "18486",
                "uid": "99d29876-d723-4b63-a285-7b766d4feeb9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "17091",
                "uid": "5233a24e-24f1-4319-902d-b82144cfbf18"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "19733",
                "uid": "2041e9c0-61e2-4503-8670-4a3846bccf6f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "19607",
                "uid": "b6a9a5f5-c37d-409c-90f7-f5b7f9e95acf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "18456",
                "uid": "dc9d9c5c-2a7a-45d8-bba3-a6657ad4cee6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "17034",
                "uid": "8a460724-db56-47ae-b9ee-755dd82aa0ed"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "19714",
                "uid": "0cb345c2-4fa8-4260-8ba9-56238392e368"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "19876",
                "uid": "d2124d5a-f13e-4cfe-8a55-aa4066abd176"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane",
                "resourceVersion": "18315",
                "uid": "429b39d4-138e-4afa-ba77-938aa74fab4a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane",
                "resourceVersion": "16964",
                "uid": "0112fc88-b543-45df-ad33-6a9e658048f1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane",
                "resourceVersion": "19599",
                "uid": "31b7aeb5-8bd4-487d-a85d-0c24906d6581"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane",
                "resourceVersion": "19779",
                "uid": "fe490dd2-f4df-4275-8818-c83f6b488b53"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "18336",
                "uid": "fe453d89-27a0-4480-81fe-b61496f1bb4a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "16971",
                "uid": "dc860c5c-ab82-4bdd-af6c-8e77ccb546c4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "19652",
                "uid": "a8fd767e-cde2-404c-b4c4-be164e6dc086"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "19792",
                "uid": "0b9996a5-7fb0-4cde-a916-c7b68d24cdf8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "18394",
                "uid": "619747fe-13e5-498e-a730-37092061178f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "16987",
                "uid": "b8791c45-830f-4a2d-b64f-48a6f8ad2197"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:30Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "19687",
                "uid": "e5c4d949-06c3-4445-854a-6a7c43152c25"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "19865",
                "uid": "9f54a01b-df31-4ab7-8e55-0d69448387f9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "18451",
                "uid": "cc03fa8d-8e2b-43a3-b4c5-49be676429af"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "17031",
                "uid": "636886a0-9b3e-4d8a-949a-952d3ed68fbf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "19708",
                "uid": "81074192-3b29-4d2f-bb05-b1c67c4936ad"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "19875",
                "uid": "bb849474-4ed3-4efd-a7be-23ff21c53166"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "18236",
                "uid": "d0531709-6af6-43ce-a0d6-0b6037b64786"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "16936",
                "uid": "8862a484-cc0a-4e19-be45-b7f791b573eb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "19534",
                "uid": "33f19a4f-bae8-4da9-b3f5-b26f6b70693c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "19735",
                "uid": "b8e7e252-08f4-493c-9361-07ff88da3767"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "18326",
                "uid": "07fbcb5d-54b5-4cac-83e3-3b15d087158a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "16968",
                "uid": "3d281aeb-aae8-4112-a212-4c395902ad5e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "19633",
                "uid": "481c6af1-a43e-4c7b-b74b-9658b54b0541"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "19785",
                "uid": "6b9ef7ea-4801-42b0-a68d-1c9616752318"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "18279",
                "uid": "425ff25b-3ef3-4203-bea8-b5e778eda982"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "16948",
                "uid": "5c5959b1-6b81-44ac-a7a1-abe3866524a7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "19551",
                "uid": "0ab027f9-a49c-496d-9c63-edcc9d0237b9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "19755",
                "uid": "fee520f7-f47c-4d5b-b421-3d7ff29b1749"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "18114",
                "uid": "99619e82-2d92-4798-9998-6b1c75b3bf1c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "16714",
                "uid": "cf30eb29-23b4-4352-9c93-1977a7ccf519"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "19788",
                "uid": "012ef6a3-6c72-458e-bd05-01c00e55054c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "19688",
                "uid": "399e2ddf-ff14-4ec8-917a-43b43e1c4044"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "18240",
                "uid": "d622689d-85e4-4859-b616-c9dec296b0f7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "16939",
                "uid": "5ad6b27a-ba21-4330-a1bf-6a9591be37e7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "19536",
                "uid": "ce5ee859-d6a2-47cd-ac88-fac9df534d79"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "19736",
                "uid": "29e1249d-5d8b-4b00-8105-a5c34d8a6cc4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "18303",
                "uid": "c4986f56-9f1a-4fd0-bc8e-4ffc360ccf2b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "16957",
                "uid": "823a32da-91e2-4534-8b7b-deeeaac15ee4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "19567",
                "uid": "88cd8327-3ebe-4434-8197-969a61eb217e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "19771",
                "uid": "5a15968e-3184-4673-8a60-36629e0554e1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "18328",
                "uid": "bf2644d9-70b9-4ddc-a0f9-723380abce97"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config-managed",
                "resourceVersion": "16969",
                "uid": "cf8b3d42-49a0-4a3b-9d7d-93beaf23d47a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config-managed",
                "resourceVersion": "19641",
                "uid": "f34553b4-68fe-487e-bdb1-60f6da34f235"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config-managed",
                "resourceVersion": "19787",
                "uid": "cff61820-7c5a-4877-aeff-6970d3ad7519"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "18125",
                "uid": "7e5ecaa3-b863-4879-b912-f29292bb3719"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config-operator",
                "resourceVersion": "16727",
                "uid": "bc80a59f-9869-457e-95dd-6e779bd612e9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config-operator",
                "resourceVersion": "19791",
                "uid": "9e1d8e92-e019-4769-b9c5-a3aee7b452eb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config-operator",
                "resourceVersion": "19692",
                "uid": "9d777cc2-fac6-44ef-a511-3dea99028e9c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config",
                "resourceVersion": "18281",
                "uid": "e28668de-7f3b-49d6-8586-bde6186a82ec"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config",
                "resourceVersion": "16949",
                "uid": "a9e5f832-483f-4349-8c02-e3120c4a4888"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config",
                "resourceVersion": "19553",
                "uid": "afacbbee-146b-452d-bda3-47c66d79fdb6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config",
                "resourceVersion": "19758",
                "uid": "59223afa-8418-49d4-826e-3e1ba666bd03"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "18182",
                "uid": "644b5531-1fbe-4cde-9073-d026b4ec151e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console-operator",
                "resourceVersion": "16849",
                "uid": "f9c2a44d-d3df-4b87-9b2d-18382cb12812"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console-operator",
                "resourceVersion": "19524",
                "uid": "d0d55e2c-2def-4e90-8da9-a79583ffec6c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console-operator",
                "resourceVersion": "19719",
                "uid": "9d8ce53c-8af2-4136-9f38-ccf8213d6418"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "18255",
                "uid": "5bebbf5b-1547-4562-8b5e-09a1cbabc841"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "16943",
                "uid": "db13f9b1-51f2-46eb-9b85-d10b6c4f660a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "19539",
                "uid": "27d39fec-b6de-487e-83db-84f880293cbc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "19746",
                "uid": "47ea7419-2f92-4043-b1f2-f4f4d3d37421"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console",
                "resourceVersion": "18139",
                "uid": "bacf5561-fe2a-4fe5-80f3-9211d58206e5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console",
                "resourceVersion": "16755",
                "uid": "a0fedf69-6b65-4dc0-8468-0026f640a4e5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console",
                "resourceVersion": "19806",
                "uid": "178c583a-201a-4d77-a72a-f4f5f2a1fbb2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console",
                "resourceVersion": "19696",
                "uid": "301b48e7-bdc2-4e7d-8d83-1435cfc08a8e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "18468",
                "uid": "57b913b7-28e0-4f60-8dd3-68c69a3cb7e1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "17063",
                "uid": "f4f65cee-579c-4ebf-9f2c-93be1d63239c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "19722",
                "uid": "a75f6751-bc3a-478f-9674-e1f5134483cc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "19566",
                "uid": "1a12ace3-fce1-4743-9fbf-71154a41a7c9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "18343",
                "uid": "374a9442-f3e4-4c10-b500-5f16d2fae5f0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "16972",
                "uid": "31adf375-f0d0-40de-8d53-3c752f75e9ee"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "19658",
                "uid": "efda3e6a-94d9-49ab-98f5-e3bfa6d94df4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "19796",
                "uid": "df65d75c-bbc5-4ddd-8eb6-fe8fe39f7088"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "18510",
                "uid": "94a99ed2-7ed2-42ea-9c08-08051f40aaab"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "17116",
                "uid": "95266a4d-91ba-4d19-9e81-63124308e056"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "19759",
                "uid": "07db939a-b7f5-4d5e-a5bd-9f4ee32ce8e6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "19653",
                "uid": "c7fca8c3-267d-4f73-943a-92fa10beb727"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "18082",
                "uid": "27f895d2-fea9-460e-9588-650134678adc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "capabilities": "Basic Install",
                    "categories": "Application Runtime, Monitoring, Security",
                    "certified": "false",
                    "containerImage": "quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204",
                    "createdAt": "2026-03-10T08:28:54Z",
                    "description": "The deployment validation operator",
                    "olm.operatorGroup": "deployment-validation-operator-og",
                    "olm.operatorNamespace": "openshift-deployment-validation-operator",
                    "olm.targetNamespaces": "openshift-deployment-validation-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.package\",\"value\":{\"packageName\":\"deployment-validation-operator\",\"version\":\"0.1.568-g6f8f204\"}}]}",
                    "repository": "https://github.com/app-sre/deployment-validation-operator",
                    "support": "Best Effort"
                },
                "creationTimestamp": "2026-04-03T00:04:44Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "14784",
                "uid": "0c796ad2-311a-4e4b-91c2-833886c165db"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {},
                "description": "The Deployment Validation Operator (DVO) checks deployments and other resources against a curated collection of best practices. These best practices focus mainly on ensuring that the applications are fault-tolerant. DVO reports failed validations via Prometheus metrics. If the best-practice check has failed, the metrics will report `1`.",
                "displayName": "Deployment Validation Operator",
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "*"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "deployment-validation-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "deployment-validation-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app": "deployment-validation-operator"
                                        }
                                    },
                                    "strategy": {
                                        "rollingUpdate": {
                                            "maxSurge": 1,
                                            "maxUnavailable": 0
                                        },
                                        "type": "RollingUpdate"
                                    },
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "deployment-validation-operator",
                                                "name": "deployment-validation-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "node-role.kubernetes.io/infra",
                                                                        "operator": "Exists"
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                },
                                                "podAntiAffinity": {
                                                    "preferredDuringSchedulingIgnoredDuringExecution": [
                                                        {
                                                            "podAffinityTerm": {
                                                                "labelSelector": {
                                                                    "matchExpressions": [
                                                                        {
                                                                            "key": "app",
                                                                            "operator": "In",
                                                                            "values": [
                                                                                "deployment-validation-operator"
                                                                            ]
                                                                        }
                                                                    ]
                                                                },
                                                                "topologyKey": "kubernetes.io/hostname"
                                                            },
                                                            "weight": 100
                                                        }
                                                    ]
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--config /config/deployment-validation-operator-config.yaml"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE"
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "deployment-validation-operator"
                                                        },
                                                        {
                                                            "name": "NAMESPACE_IGNORE_PATTERN",
                                                            "value": "openshift.*|kube-.+|open-cluster-management-.*|default|dedicated-admin"
                                                        },
                                                        {
                                                            "name": "RESOURCES_PER_LIST_QUERY",
                                                            "value": "5"
                                                        },
                                                        {
                                                            "name": "VALIDATION_CHECK_INTERVAL",
                                                            "value": "2m"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        }
                                                    ],
                                                    "image": "quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204",
                                                    "imagePullPolicy": "Always",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 30,
                                                        "periodSeconds": 10,
                                                        "timeoutSeconds": 3
                                                    },
                                                    "name": "deployment-validation-operator",
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10,
                                                        "timeoutSeconds": 3
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "memory": "400Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "50m",
                                                            "memory": "400Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "readOnlyRootFilesystem": true
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/config",
                                                            "name": "dvo-config"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "nodeSelector": {
                                                "kubernetes.io/arch": "amd64"
                                            },
                                            "restartPolicy": "Always",
                                            "serviceAccountName": "deployment-validation-operator",
                                            "terminationGracePeriodSeconds": 30,
                                            "tolerations": [
                                                {
                                                    "effect": "NoSchedule",
                                                    "key": "node-role.kubernetes.io/infra",
                                                    "operator": "Exists"
                                                }
                                            ],
                                            "volumes": [
                                                {
                                                    "configMap": {
                                                        "name": "deployment-validation-operator-config",
                                                        "optional": true
                                                    },
                                                    "name": "dvo-config"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "list",
                                            "delete",
                                            "update",
                                            "watch",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "deployment-validation-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    }
                ],
                "keywords": [
                    "dvo"
                ],
                "labels": {
                    "alm-owner-dvo": "deployment-validation-operator",
                    "operated-by": "deployment-validation-operator"
                },
                "links": [
                    {
                        "name": "repository",
                        "url": "https://github.com/app-sre/deployment-validation-operator"
                    },
                    {
                        "name": "containerImage",
                        "url": "https://quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "selector": {
                    "matchLabels": {
                        "alm-owner-dvo": "deployment-validation-operator",
                        "operated-by": "deployment-validation-operator"
                    }
                },
                "version": "0.1.568-g6f8f204"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:04:44Z",
                        "lastUpdateTime": "2026-04-03T00:04:44Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:44Z",
                        "lastUpdateTime": "2026-04-03T00:04:44Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:45Z",
                        "lastUpdateTime": "2026-04-03T00:09:45Z",
                        "message": "install timeout",
                        "phase": "Failed",
                        "reason": "InstallCheckFailed"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" waiting for 1 outdated replica(s) to be terminated",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:10:01Z",
                        "lastUpdateTime": "2026-04-03T00:10:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:10:01Z",
                "lastUpdateTime": "2026-04-03T00:10:01Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"*\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "deployment-validation-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "16701",
                "uid": "dd5ac2e0-e52a-4f31-9384-cce5ef797394"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "19782",
                "uid": "636bcb4f-7a58-4917-b4ad-7c0d1c7bb6d2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "19681",
                "uid": "ea69df40-528e-42dd-9447-185b66ea45b5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "18152",
                "uid": "d2a64708-9f4e-43fa-9370-c5642dfea4e4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "16792",
                "uid": "98e54268-0f9d-41e6-aa2b-63124ffae409"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "19514",
                "uid": "7695d94d-f365-43f8-aed0-de4b9919d8da"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "19705",
                "uid": "fab8acce-8fd5-4ea7-a287-0733c8f83c19"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-dns",
                "resourceVersion": "18354",
                "uid": "bb183910-c1d5-4afa-a77f-fc59a0559aa0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-dns",
                "resourceVersion": "16977",
                "uid": "6ac25ff7-1ae2-427f-9b04-81470f111f61"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-dns",
                "resourceVersion": "19667",
                "uid": "90f5f19d-4aa3-456e-a964-728eec1ae939"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-dns",
                "resourceVersion": "19823",
                "uid": "02aa6d76-f0f4-4017-9ec9-a91434e11a91"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-etcd",
                "resourceVersion": "18224",
                "uid": "087ece14-0437-44c9-a9f8-4795a692969c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-etcd",
                "resourceVersion": "16893",
                "uid": "c7060e37-432f-4201-b347-2d2fd9ad9e11"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-etcd",
                "resourceVersion": "19528",
                "uid": "d334439a-8be5-43f4-9891-f07cbfd2af5b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-etcd",
                "resourceVersion": "19725",
                "uid": "518b4adb-2108-4466-b5f1-973ad67d9de5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-host-network",
                "resourceVersion": "18070",
                "uid": "fa4650c5-c276-4193-a407-2c2f94a23857"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-host-network",
                "resourceVersion": "17138",
                "uid": "74aacb48-2c32-462e-a5de-de1db31c1336"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-host-network",
                "resourceVersion": "19774",
                "uid": "9a2a22e5-e338-45fa-b915-d680e7be9ee9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-host-network",
                "resourceVersion": "19675",
                "uid": "de06d00e-18b0-4ae1-b852-7ad9337018fd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "18473",
                "uid": "99b382ec-1073-4bd0-80af-c4a4fc4619d6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-image-registry",
                "resourceVersion": "17068",
                "uid": "c4296232-af06-4cf3-a1ba-873e4445cae7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-image-registry",
                "resourceVersion": "19724",
                "uid": "d0091619-1d73-45d8-a43e-111f95cddda2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-image-registry",
                "resourceVersion": "19571",
                "uid": "3d7026da-1aac-41f4-ac22-c0b8597be987"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-infra",
                "resourceVersion": "18192",
                "uid": "ce70d4e3-e549-46fd-964d-f81bf1e10f01"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-infra",
                "resourceVersion": "16862",
                "uid": "145ac326-256a-457c-a873-1e7f0a6a78c5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-infra",
                "resourceVersion": "19525",
                "uid": "ec801d1e-1fe0-4df7-8c74-9b8e7683c721"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-infra",
                "resourceVersion": "19721",
                "uid": "faaf8c3a-0816-4f28-93ef-ed0adeebd676"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "18445",
                "uid": "747d3979-e23f-4f7d-89d1-d9a8f50f3cbd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "17020",
                "uid": "b99b86fc-29fe-499f-8c5e-15fb979e3f59"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "19704",
                "uid": "1795b84a-8909-40cf-be9c-b5ac9fe0d544"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "19873",
                "uid": "492323c5-acaa-4eb5-8aaf-54b3a53fc506"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "18415",
                "uid": "779cf551-a41e-4a1d-a1e3-d4ce3fa044c3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "17000",
                "uid": "69002178-29e8-4539-8085-c71f374a5ff5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:30Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "19693",
                "uid": "d5db02c1-d5a2-40a4-8202-5e4da722922e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "19869",
                "uid": "fc7994b5-0f10-4711-81de-534d78974e96"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress",
                "resourceVersion": "18423",
                "uid": "f6821299-eee3-4648-9479-cf1dbc55983d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress",
                "resourceVersion": "17004",
                "uid": "e0c9edde-7240-473f-9787-b676b761555d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress",
                "resourceVersion": "19695",
                "uid": "e28a8515-1e5d-40c4-8ac2-704b2d6109f3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress",
                "resourceVersion": "19870",
                "uid": "a1428c1f-c34d-4430-b89d-e0f5ab69d693"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-insights",
                "resourceVersion": "18439",
                "uid": "3fa903c4-67b3-47e2-8173-401a4d16bc3f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-insights",
                "resourceVersion": "17015",
                "uid": "0380546a-6884-4c54-bb47-ebd83a3f5865"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-insights",
                "resourceVersion": "19702",
                "uid": "836ba9ea-2021-4e74-93e2-7ac3d3c4de17"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-insights",
                "resourceVersion": "19872",
                "uid": "7039e544-f6a1-4c81-aec4-31d637e67bd3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "18160",
                "uid": "c09aca83-708d-4b72-add6-af794d3c4bd5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "16829",
                "uid": "3d95f6e5-1ffe-4cfd-8698-c9ce29865281"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "19518",
                "uid": "a6c28cfa-b8cf-415d-8088-480580e03cf8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "19711",
                "uid": "1ef01d65-6ed7-4318-882f-947f778f8404"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "18345",
                "uid": "bcd264de-0c8e-4723-8617-5c087fc11478"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "16973",
                "uid": "ae9e530a-be97-49f5-b41f-0e5d797f7e65"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "19663",
                "uid": "2c4bc125-fa1a-43d2-a22f-0f47666e9a95"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "19805",
                "uid": "3be705d5-3893-420a-99fc-5ef5e2c52e21"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "18349",
                "uid": "89218652-7288-4c43-a2aa-c110ae8ec589"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "16976",
                "uid": "7010fe07-53f4-4e80-a59c-4449a4961517"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "19665",
                "uid": "8cb95b46-4c90-46a6-bd79-20f1ba25b331"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "19815",
                "uid": "cae8d89b-3c8c-4a9f-b704-20f765c838fa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "18145",
                "uid": "284424ca-7f9e-4e41-b5ec-e0101684ae5d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "16764",
                "uid": "f2d57847-44db-45b8-9d8e-7ee97bab8549"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "19506",
                "uid": "ee36335b-0f16-45e2-9a96-ad487052a315"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "19698",
                "uid": "358daf46-e479-4018-8fd8-e0c573142f58"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "18283",
                "uid": "540d9f6b-9c72-4e0a-9e00-08170ecccb5a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "16951",
                "uid": "868b2314-c2aa-46d1-b543-a61dba948f27"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "19554",
                "uid": "8ebe6bca-ce42-4092-b0b0-2da2c26cba6e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "19760",
                "uid": "d05ac092-6279-4721-98e7-119e13205546"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "18212",
                "uid": "54b4ccd4-4a61-4b0b-8046-269b1a8f1abd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "16876",
                "uid": "14cfc8de-baf8-4d46-a331-7333cc0ac7c3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "19527",
                "uid": "54e698ce-0bc4-4d0c-b95a-71b886e759e6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "19723",
                "uid": "53730cf0-89bb-4b67-99fa-00f6a57730a3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "18154",
                "uid": "125fa268-566b-419c-a58b-480b0f1bb3a4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "16811",
                "uid": "ba5f2103-8235-4bea-bea5-9b9cc59316d2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "19516",
                "uid": "ef2bd4ca-e160-4233-a628-284713ba606d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "19707",
                "uid": "6e03ecf9-81f9-4a7d-a560-ef53af6ed925"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "18365",
                "uid": "2de21be2-f2aa-4c3b-94ab-78639d0e8d3e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "16980",
                "uid": "d544799a-7e02-434e-8991-4a6f2442f92e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "19676",
                "uid": "0ec77ce2-a184-417a-a73d-42c630b69778"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "19854",
                "uid": "56ce678f-9ec8-46f8-95d6-690cdf16fa43"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-logging",
                "resourceVersion": "18357",
                "uid": "22e4c7c8-6da3-4438-b363-e3498cac26d5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-logging",
                "resourceVersion": "16978",
                "uid": "f2df5ecc-84a0-4a6b-bbf8-d44e304560d0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-logging",
                "resourceVersion": "19670",
                "uid": "771da768-b647-4e5a-a9a1-513e390c6df2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-logging",
                "resourceVersion": "19830",
                "uid": "06761135-d91c-436f-aa8c-e511140581e8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "18466",
                "uid": "3a9032b1-acf3-42fc-8eac-e5cd1b866357"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-machine-api",
                "resourceVersion": "17049",
                "uid": "b23778d2-8c91-4ef2-9afd-ccf65495edc8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-machine-api",
                "resourceVersion": "19720",
                "uid": "46bf8742-366a-4f3e-a4dc-f8ca5b4dec65"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-machine-api",
                "resourceVersion": "19565",
                "uid": "b490ad7e-ef90-4af7-b623-a39067f4d8f3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "18412",
                "uid": "0206d4f5-e8ef-42a8-a2dc-7ccec908bd27"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "16995",
                "uid": "90f81ff6-e184-48d5-b50e-1d4c0ba11169"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:30Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "19689",
                "uid": "29f463cf-7ad0-447b-82b3-09c96ac55c70"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:14Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "19866",
                "uid": "9a0bf1b8-87f4-4001-93f6-d200509c42ee"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "18248",
                "uid": "e0456461-e9f7-4133-93f6-04c18092b2cd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-marketplace",
                "resourceVersion": "16941",
                "uid": "82134f14-b93c-4e83-8236-2ed4c9b9513f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-marketplace",
                "resourceVersion": "19537",
                "uid": "818392b5-ece1-4cf1-8bde-edd3fbfb3b0b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-marketplace",
                "resourceVersion": "19738",
                "uid": "439ea972-202b-4cac-a880-69c8c4f97e55"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "18329",
                "uid": "ab431266-2a78-417e-866d-498ed9978182"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-monitoring",
                "resourceVersion": "16970",
                "uid": "b4c4456c-5984-48a5-9ed0-5524baca067b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-monitoring",
                "resourceVersion": "19647",
                "uid": "1f672755-5cf6-4135-8c84-836d0b95dfad"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-monitoring",
                "resourceVersion": "19789",
                "uid": "84b9789b-1a93-4ffb-940e-464b5b5a5cba"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-multus",
                "resourceVersion": "18066",
                "uid": "73f1d2e8-1c8e-42d3-aff1-3d700ca55f7d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-multus",
                "resourceVersion": "17135",
                "uid": "fae8e970-6c1f-4f3e-bb57-ab8f86ca7915"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-multus",
                "resourceVersion": "19772",
                "uid": "d0b52691-ea5f-4981-9567-c093e8691c97"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-multus",
                "resourceVersion": "19671",
                "uid": "ff22ba77-d76a-4e6d-a368-f376c5a09343"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "18513",
                "uid": "daf3ddee-ab85-4f53-b95f-5fa932578205"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "17120",
                "uid": "316e222b-95b9-4110-966c-7861a61945b9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "19761",
                "uid": "d985e618-f720-4f79-a18f-b762c7f864a4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "19657",
                "uid": "ca8ff91f-9490-4a7e-b065-c6f98f4f6d41"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-console",
                "resourceVersion": "18073",
                "uid": "ada8d8e3-8c93-4f84-b8c7-650851d90879"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-console",
                "resourceVersion": "17142",
                "uid": "d92a80f4-427b-44fb-ae74-44dce91ddf92"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-console",
                "resourceVersion": "19776",
                "uid": "bb7c6c6f-98d5-4d56-a39b-86d812a02478"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-console",
                "resourceVersion": "19677",
                "uid": "faae9849-5d43-44ad-84ee-93ed59e4a6e1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "18285",
                "uid": "6b6ee554-f2f7-4736-a1cb-28981b85b329"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "16952",
                "uid": "9aff1ba4-bdc6-4223-9b56-5b473d5e6332"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "19556",
                "uid": "f075712f-c657-4f4b-a662-e8c007842960"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "19763",
                "uid": "cc7476ab-95f6-4dc0-82f8-1e33f1380e96"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "18271",
                "uid": "2de0066f-be4f-4a37-84ea-5b23d5c078c2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "16945",
                "uid": "40a6bc91-4f48-41d6-994f-37a4a263964f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "19541",
                "uid": "e3143b6e-4669-409d-89cd-b49e5b54db96"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:21Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "19752",
                "uid": "4c3b7212-9016-4c0e-9f84-f2f8d51cc500"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "18131",
                "uid": "928ca19f-e688-43fc-9460-d186487a89da"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-operator",
                "resourceVersion": "16741",
                "uid": "ef62c0c4-ca31-4345-b3e6-efabc90a6209"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-operator",
                "resourceVersion": "19795",
                "uid": "17cdfbe0-67e4-4174-9974-ddf861f2b396"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-operator",
                "resourceVersion": "19694",
                "uid": "b6d6f555-213c-49f5-8daa-7ae5410f4531"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-node",
                "resourceVersion": "18306",
                "uid": "2334c4b2-04ce-4259-92aa-04538be9f634"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-node",
                "resourceVersion": "16959",
                "uid": "ca6219ea-700c-4e68-acd2-670a725150ce"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-node",
                "resourceVersion": "19572",
                "uid": "b383fce7-1a5d-4e0e-aa45-2099ea573057"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-node",
                "resourceVersion": "19773",
                "uid": "b07b8f44-893b-4319-92fd-d7ca1001e9a3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "18308",
                "uid": "1790a5bc-f92f-4089-b93f-b559598ad998"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "16961",
                "uid": "6d470a24-7990-4249-82ea-af0565b1faa8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "19579",
                "uid": "14f26aa3-cdbc-4b6d-b5fa-6ac78ce461f9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "19775",
                "uid": "a5ab86a2-f154-4bbf-8708-6dff9a20ec7b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "18078",
                "uid": "3f581453-8d83-46cd-9afd-840487c698b6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "16700",
                "uid": "c5e238a4-b76f-471a-a1ca-79f8d5edbf08"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "19780",
                "uid": "5388bda2-5edd-4d11-bcd3-4d45a55cabdf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "19679",
                "uid": "8bd698df-4de6-4815-8327-f99b95513569"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operators",
                "resourceVersion": "18481",
                "uid": "ea064b47-99c3-4ba9-8e5a-2a3eb016fdff"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operators",
                "resourceVersion": "17081",
                "uid": "6be460b5-7ab5-4a2b-8a71-1216c0f33416"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operators.coreos.com/openshift-pipelines-operator-rh.openshift-operators": ""
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operators",
                "resourceVersion": "19358",
                "uid": "3d4f9505-461a-4889-b382-9167ca3fb0d7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:13Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators",
                "resourceVersion": "19557",
                "uid": "6e2d4d09-b126-43d5-ae6a-c82244073b85"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "18231",
                "uid": "6a2b646c-e9a4-40aa-9ec3-513042a47ae5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "16930",
                "uid": "af72bcb2-cd62-41e4-a3c4-e1c864fbc6f7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "19532",
                "uid": "d4ae33aa-fa45-4eef-8959-b27dc3a9a4a4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:20Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "19732",
                "uid": "5e647280-c5ad-401c-99ba-b708cca72f43"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "18484",
                "uid": "fbb64502-e27d-46fa-b9b2-183babc96d37"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-package-operator",
                "resourceVersion": "17086",
                "uid": "0067ea95-92b3-4d49-be84-c0f1d3c1b8c0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-package-operator",
                "resourceVersion": "19731",
                "uid": "bf4ab2db-1946-4dee-a186-3a2a9e4cff66"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-package-operator",
                "resourceVersion": "19595",
                "uid": "5e12a2ce-ea33-444f-aecc-16cecbc31a33"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19998",
                "uid": "d3189667-fc53-4c80-b930-d8361ea55f08"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:12:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20011",
                "uid": "bb38dd30-76f2-4b50-b1ee-ddb5eadaec28"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20007",
                "uid": "3263ee2a-f7e4-4818-97ac-4b238d54a770"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20000",
                "uid": "efdf5e13-f364-41ae-b81f-1afaa1fed119"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "18065",
                "uid": "677f6d9f-5c35-4506-9e59-0d2974058252"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "17132",
                "uid": "7e75ddec-9709-4cb8-b068-7880e887659d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "19770",
                "uid": "cdb50c5c-c100-4ca9-bf40-afc65247bdd5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "19669",
                "uid": "8d1615b1-3cb4-43f6-9dc2-cb71f331c6bc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "18310",
                "uid": "56fd74af-f954-45c9-b0ec-235e7dfd6686"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "16963",
                "uid": "b7791c34-f350-48a2-943f-7eabb9aa35f7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "19588",
                "uid": "2b097b87-b1d4-4c8f-a073-f6fecd88ced5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "19777",
                "uid": "667704d4-facf-457a-9908-48441fe4e20d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "18367",
                "uid": "83b22e1c-6fa3-4578-8835-fb17f35db205"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-service-ca",
                "resourceVersion": "16981",
                "uid": "712ad2e6-50e6-488b-afb5-273706e239ef"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:29Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-service-ca",
                "resourceVersion": "19678",
                "uid": "850dabb4-ba83-4c40-b2b5-c1da648094a8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-service-ca",
                "resourceVersion": "19855",
                "uid": "26a1fe7b-7efd-4daa-838e-1180305d5989"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "18477",
                "uid": "5764581f-a3c1-40d4-8151-498dc00a3856"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "17072",
                "uid": "1360c3e8-35b6-4114-affe-d626b8e03d9a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "19727",
                "uid": "41e6fd1b-30a3-4900-9bfd-73e72e07a02a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "19577",
                "uid": "db18f93c-ad20-4893-81c0-62ced802fcca"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift",
                "resourceVersion": "18495",
                "uid": "619497f8-ebf1-4799-821a-570e1e8182cc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift",
                "resourceVersion": "17101",
                "uid": "1a99128a-cd89-4c4b-98f5-d5f795d6f5fa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift",
                "resourceVersion": "19748",
                "uid": "67cb4a4d-b967-465b-9409-62eea4f05424"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift",
                "resourceVersion": "19632",
                "uid": "f4e9be6d-824d-4606-a1a0-e923646f2df6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "rhbk-operator",
                "resourceVersion": "18087",
                "uid": "da11c049-7b5f-4fa1-a8c4-13b1fc4b063b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "rhbk-operator",
                "resourceVersion": "16702",
                "uid": "ceb75c8f-e994-4882-9328-a63a7dff5915"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:24Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "rhbk-operator",
                "resourceVersion": "19784",
                "uid": "116588c6-3c2f-4bc7-84c6-94351f75b677"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"Keycloak\",\n    \"metadata\": {\n      \"name\": \"example-keycloak\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"instances\": 1,\n      \"hostname\": {\n        \"hostname\": \"example.org\"\n      },\n      \"http\": {\n        \"tlsSecret\": \"my-tls-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"KeycloakRealmImport\",\n    \"metadata\": {\n      \"name\": \"example-keycloak-realm-import\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"keycloakCRName\": \"example-keycloak\",\n      \"realm\": {}\n    }\n  }\n]",
                    "capabilities": "Deep Insights",
                    "categories": "Security",
                    "certified": "false",
                    "containerImage": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                    "createdAt": "2025-03-26T02:27:51Z",
                    "description": "An Operator for installing and managing Keycloak",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhbk-operator",
                    "olm.operatorNamespace": "rhbk-operator",
                    "olm.targetNamespaces": "tsf-keycloak",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"Keycloak\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"KeycloakRealmImport\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhbk-operator\",\"version\":\"24.0.11-opr.1\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "repository": "https://github.com/keycloak/keycloak",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v24.0.11-opr.1",
                "namespace": "rhbk-operator",
                "resourceVersion": "18355",
                "uid": "10a9a1cd-acf0-4383-b3dd-11d994f6cc4a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents a Keycloak Realm Import",
                            "displayName": "KeycloakRealmImport",
                            "kind": "KeycloakRealmImport",
                            "name": "keycloakrealmimports.k8s.keycloak.org",
                            "version": "v2alpha1"
                        },
                        {
                            "description": "Represents a Keycloak Instance",
                            "displayName": "Keycloak",
                            "kind": "Keycloak",
                            "name": "keycloaks.k8s.keycloak.org",
                            "version": "v2alpha1"
                        }
                    ]
                },
                "description": "A Kubernetes Operator based on the Operator SDK for installing and managing Keycloak.\n\nKeycloak lets you add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.\n\nThe operator can deploy and manage Keycloak instances on Kubernetes and OpenShift.\nThe following features are supported:\n\n* Install Keycloak to a namespace\n* Import Keycloak Realms\n",
                "displayName": "Keycloak Operator",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAgAAAAGDCAYAAABdtKgRAAAACXBIWXMAACdeAAAnXgHPwViOAAAAGXRFWHRTb2Z0d2FyZQB3d3cuaW5rc2NhcGUub3Jnm+48GgAAIABJREFUeJzt3XecVPW9//HXZ7bQ2Z3dBSkqIKgUxYIVwd57TEw0xRSTmGaMubmJufml92Kqyb2amERMMYktahSNxt4LNhRRBBQpsuzM0tkyn98fZ1HawpaZ+Z4z834+HjzYnZ055/2I93Le+z3f8/2auyMiIiLlpTJ0ABEJY5FZv0FwaDvsb7CTQ4NByiGTgozDCoeXgDl17q+Hzisi+WUaARApI2aVWTjd4QLgSKC6i59caTDH4UmDR9rgkQb3uYULKiKFpgIgUg7MLAsfcPgOsEuejtoIPALcn4K7amAW7rk8HVtECkwFQKTEZcz2MrjS4aACn2qFwd0Od1XAnYPdXynw+USkF1QAREqVmWXgY8DPgP4BEswH/g3ckoY7cN8QIIOIdEIFQOLLrKIRxlbAWGCsQb1DP6DGYG0OVgGrgQUGL6Vhri4ykSVm/fvBHx3ODp2lwyqPysC/quGWge5vhg4kUu5UACRWGs32qIB3AocDhwGDuvHxduAZg3sc7lkPdw13X1uQoDG2wmxkCm4C9g+dpRPtwIMGNwA31LovDB1IpBypAEhwC8z61sCHHM43OCCPh15rcJvDtc1w42j39Xk8dix1FKjbgdGhs3TDk8D1Obi+3n1O6DAi5UIFQILpuPB/1uDzDjsV+HSNwO9T8H817vMLfK4gms2mtMOtBkNDZ+mFZ4C/GlyjkQGRwlIBkCCazY7JwWXA+CKfOmfwnxxcUQfX495e5PMXRNbsSId/AoNDZ8mjJw2uboFrhrovCx1GpNSoAEhRLTHr3wcuM/hw6CzAKw4/rIMZuLeEDtNTTWbvMvgT0Cd0lgJpA/5t8Nc2uLHBfVXoQCKlQAVAimaF2fgUXAtMCp1lC68b/Hg1/G5n93Whw3RH1uxzDpcCqdBZimSdwS3AX2rhNj31IdJzKgBSFE1mh3b8w10XOktnDJY5/KwdfhP73zLNUln4icPFoaMElDW4vh3+Wg93l8rtHJFiUQGQgmsyO9HgOsIsRtMTGYfLquCXg9wbQ4fZ0gKzvrUwI0bP+MfBIuCqCvijViAU6RoVACmoJrOpBncAA0Jn6YE1DlcCP65zXxQ6DECT2S4GfwcOCZ0lxp4ErmiDvwxxXx06jEhcqQBIwawwOzAFd9G9xXziaAMwox0ubXB/KVSIrNmZDr8H0qEyJMwqg7/l4A917g+FDiMSNyoAUhCNZiMq4AlgeOgseeREoxm/TMPMYu1896bZTlXwC+A9xThfiZoD/KEdrm5wXxI6jEgcqABI/plVZ+Ae4NDQUQroNYc/VsBVNe6vFuIEy80GVsKngC8R48mTCdMG3Gbwh1q4BffW0IFEQlEBkLzLmP0SuDB0jiJxg8cdbszBjfXuL/b2gFmzUcAHHD4LDOl9RNkWhzdT8Kc2uLzBfW7oPCLFpgIgedVkdrzBTMBCZwnkDeA+4AGHpyph7mD3pu19YJnZgGrYz+FggzOAaZTv/34huMN/gP+tg3/i3hY6kEgxqABI3jSbpXPwHDAydJaYWQG8BjQDqw3WOQwyqHOoB0YBlUETykaLHX7r8Nt69zdChxEpJBUAyZus2e8czg+dQyQP2jzaUvn/6uBO9A+llCAVAMmLjkf+HqF8lqSV8vEK8LtKuDKOC0OJ9JQKgPRetCztww4HhY4iUkAbDG5qhyvq3e8MHUakt1QApNeazD5i0Yp5IuXiSYNf1cJfk7yTpJQ3FQDplQVmfWtgLrBL6CwixebwpkULDP2ywX1x6Dwi3aH7tdIrg+Ez6OIvZcpgKPClCng1YzYjY7ZX6EwiXaURAOmxjufXFwANobOIxIQDdzj8rA7u0NMDEmcaAZAeq4KPo4u/yKYMOMFgZhO8lDW7aIlZUrbBljKjEQDpGbOqTPR41K6ho4jE3HLg9w6XxWVbaRHQCID0UBbejy7+Il0xBPiSwSsZs8ubzXYLHUgENAIgPZQxewaYHDqHSALlDK5rh6/nY/MokZ5SAZBuy5od7nBv6BwiCZcDbk3BN2vcnwgdRsqPbgFItzl8OnQGkRKQAk7NweNZs383mR0SOpCUF40ASLc0mg2vgIVAVegsIqXG4E7gu7Xu94TOIqVPIwDSLRVwHrr4ixSEw7EOd2fMHlhhdmzoPFLaNAIg3ZIxewGYEDqHSJl4MAVfq3H/T+ggUnpUAKTLmswOMXg4dA6RMvSgwf/Uut8XOoiUDt0CkC6zaPhfRIrvMId7M2Y3ab8ByReNAEjXRCv/LQHqQ0cRKXM5g+uAL9a6LwgdRpJLIwDSJVk4CV38ReIg5XC2w0tNZr/ImtWGDiTJpAIgXeJwbugMIrKZaoPPerTE8KcxqwwdSJJFtwBkhzq2/V0GDAidRUQ6Ncfhc3Xut4cOIsmgEQDZoT5wFrr4i8TdeIOZGbObs2ajQ4eR+FMBkB3S8L9Iopzq8HyT2ecxqwgdRuJLtwBku1abDWmFxYDuL4okz9Mp+Jg2G5Jt0QiAbFcrvBtd/EWSat8cPJQx+x5mfUKHkXjRCIBsV8bsIeDQ0DlEpNdmG7yv1v2Z0EEkHjQCIJ3Kmo0CtEWpSGmY5PBIxuxLmOnfflEBkM45vB+w0DlEJG/6Aj/IwD+1gJCoAMj2nBM6gIgUxKkOj2tfgfKmAiDblDXbB9A/DiKlaxzwcJPZO0MHkTBUAGSbHN4XOoOIFNxAg380mf1X6CBSfHoKQLZmZhmYD4wKHUVEiuaHafgyuiiUDY0AyFaycDi6+IuUmy81wc9Ch5DiUQGQrTi8N3QGESk+g4uazL4VOocUh24ByObMqjPR0r/1oaOISBgOX6hzvzR0DiksjQDIZrJwIrr4i5Q1gx9lzE4NnUMKSwVANqPhfxEhujb8ZYXZhNBBpHB0C0De0mg2qAKWAv1DZxGRWHgmDQfh3hI6iOSfRgDkLZVwJrr4i8jb9mmCr4QOIYWhAiBvcTg3dAYRiReDL2fN9g2dQ/JPtwAEgNVmQ1qj2f+VobOISOzcl3Y/InQIyS+NAAgArfAedPEXkW07PGN2WugQkl8qALKRhv9FZHu+j5m2By8hKgBC1mwUcGjoHCISa5MyoLUBSogKgODwfkDNXkR25AuhA0j+qAAIaPEfEemawzNmk0OHkPxQAShzHY/3TAydQ0SSweCDoTNIfqgAlDkt/Ssi3ZGD92NWFTqH9J4KQDmLZvS+O3QMEUkOg6FNcHToHNJ7KgBlLAuHA6NC5xCRZDF4R+gM0nsqAGVMw/8i0hMGZ2JWETqH9I4KQLmK7uG9M3QMEUkeh51WwJTQOaR3VADKVAZOAOpD5xCRZEppHkDiqQCULy39KyI9ZnBM6AzSO9oNsAwtMevfF5YBA0NnEZHEWr8G6nZ2Xxc6iPSMRgDKUF84A138RaR3+g6CqaFDSM+pAJQnDf+LSK/ldBsg0VQAykyzWZpoAqCISK9oHkCyqQCUmRycDVSHziEiyeew/3Iz3U5MKBWA8qPhfxHJl8pqOCh0COkZFYAy0mg2ApgeOoeIlA7XRMDEUgEoIyk4B9DynSKSNw6Hhc4gPaMCUF40/C8i+TZV+wIkkwpAmVhpNs7ggNA5RKTkDM7AxNAhpPtUAMpEDt4XOoOIlCzdBkggFYAy4fDu0BlEpGSpACSQCkAZaDbbHw3RiUjhqAAkkApAGchp8p+IFNaYFWYjQ4eQ7lEBKHVmRrT6n4hIwRgcEjqDdI8KQInLwuHAqNA5RKS0pXQbIHFUAEqca/hfRIpDBSBhzN1DZ5BCMavKwGKgIXQUESl5reuhdrj72tBBpGs0AlDCMtG2v7r4i0gxVPWDA0OHkK5TAShtGv4XkaLRvgDJogJQohaZ9QNOD51DRMqKCkCCqACUqP5wCjAwdA4RKStTMdN1JSH0H6pEpeA9oTOISNmpbYIJoUNI16gAlKBlZgMcTgqdQ0TK0tTQAaRrVABKUHV0739A6BwiUpY0DyAhVABKk4b/RSQIUwFIDC0EVGKazAYbLAP6hs4iIuWpDYYPcV8aOodsn0YASkwKzkQXfxEJqAoODZ1BdkwFoMS4hv9FJDzdBkgAFYAS0myWBo4NnUNEyptWBEwGFYAS0g5nAdWhc4hI2ZuyxKx/6BCyfSoAJUSL/4hITFT1hSmhQ8j2qQCUiFVmDQ5Hhc4hItJBCwLFnApAiWiDdwGVoXOIiHTQPICYUwEoHRr+F5E4mYqZhQ4hnVMBKAGfNxsJTA+dQ0RkE/UrYM/QIaRzKgAloB7OBipC5xAR2ZSWBY43FYCEM7PKGk3+E5F4UgGIMRWA5DslDYNDhxAR2VJKBSDWVACS74IBoIk2IhI7DruvNhsaOodsmwpAgpnZaOAE3fwXkZiyNm0MFFsqAMn2MSC1MHQKEZFOuBYEii0VgIQysyrgIwBzoSpwHBGRzmgeQEypACTXGcAwgJthVOAsIiKdOWCBWd/QIWRrKgDJdcHGLxbAyPXwcsAsIiKd6TMY9g8dQramApBAZjYOOGbT1/4DiwLFERHZLi0IFE8qAMn0cbZ49O8SGA+0hIkjIrJdKgAxpAKQMGZWDXxwy9cXwfCX4LEAkUREduQwbQwUPyoAyXMWsM2FNS6CesCLG0dEZIcaGmH30CFkcyoAyfOJzn7wGEyYAw8UM4yISFdUaj2A2FEBSBAz2xM4fHvvOQvGOawqUiQRka7SPICYUQFIlgvYwbr/S2H4dfB4kfKIiHSJqwDEjrnrlnESWLSQxhtA3Y7eWw3r58PCfrBn4ZOJiHSJV8LQQe6NoYNIRCMAyfFuunDxB2iBvqdADlhf2EgiIl1mbXBI6BDyNhWA5Lhgx29529Mw4W/wYKHCiIj0gG4DxIhuASSAme0FPNfdz1VA28vwfC3sW4BYIiLddX/afbsTmaV4NAKQDN367X+jdqg8FIa3w9J8BxIR6YEDiRYzkxhQAYg5M+sHvK+nn18GO707mjyoZYJFJLS+TdoYKDZUAOLvXCDdmwPcDVN+C/fnKY+ISG9oQaCY0ByA0MxSzVAD1Hr092CHwXR8vSd8ZDkckIcz+f1w7yQ4Mg/HEhHpEYfr69zfGTqHqADkn1mfLAx3GGkw1GEIMMShwaK1+hsM6j1az78BGNjZoVrhjeEwMpenaFXQ8hw8OzQ/hUJEpCeWpt2Hhw4hUBk6QKKYVWRhl3YYZzAqBTs7jARGEH093DbZqGfTarXp8n1drVy3wMJcdPy8aIXqA2HPF2FO/2j7YBGRYhvWbDa2xn1e6CDlTgVgS2YVK2G3jov8uFz091hgHDAGqN44cWLLC3me97r0H0Tny6tVMOhAqH0WFlXAzvk+vojIjnQsC6wCEFhZ3wJYaVaXg32AycDeOdjHYBLQL3A0VsDs3aMsBbEXzLkH6lPRLQoRkWK6Iu3eo8ebJX/KZgSg2Sydi1rnoUQL40xmi9+A8/wbfK/8BZoLefznYfyJ8PztUGFdXGJYRCRP9CRADJTsCECj2YhUdMGfZtHf+5Ggxx6nwaIXijBEfzA8cyuMMqgt9LlERDp4BTQMdm8KHaSclUwBWG42rAJOMTgGmE6C72+3w7IhsFOxzncMPPGPaFJgp08kiIjk2Slp91tDhyhnyb0FYGbZaCj/VOC0yujRtjiN4vfYHJhPEQvAXXDA++DRP8NEYFCxzisiZW0qoAIQUKIKwCKzfgPgaOA04BQS/Fv+9twU4Jy3wcFnwqwbYLT1cuVBEZEu0M6AgcX/FkC0Ut5R7fB+g7OIVskraYfDwudhVIhzHwCzZ8JQPR0gIgW2Ng21uLeGDlKuYlsAms3G5OBjwHnkcTGcBGgbBrQEHJ2ZBC/eCzWpaIEjEZGCyMFB9e6Ph85RruI1K94slTE7LWP2rxy8AnyZ8rr4swHeCHnxB5gNEw6BNa3RXAQRkYKo0G2AoOJRAMz6ZM3Oy8BsolvgJxOXbEW2HJaHzgDwCuw+Efqvglmhs4hIyVIBCCjoRTZjVpM1+1oGXne4Cq1Pz1xYFzrDRitgp/Gw+xvwcOgsIlJ6XAsCBRWkACwzG5AxuwR41eGbaMLZW+Z3fa+golgHA/eFKc/AnaGziEjJGdFslvc9T6RrilsAzCoyZp/sE20C8X20BO1WMjG89dEO1UfBMTfCbcSsoIhIsuV0GyCYol1sVpgdlIWHgN94ERe5SZomqAidoRP2ETjpIrgXWBk6jIiUDN0GCKTgBWCVWUPG7E8peMThoEKfL+myUBU6w/ZcDUeeCPPbYVHoLCJSEjQCEEhBC0DG7OQ2eAZ4HyWyTG+hZaA6dIYdeQz2mQipZngydBYRSby9MmY1oUOUo4IUgIxZTcbsT8C/0GIy3ZKUJbGWw4g9YfwcuCt0FhFJtJTDIaFDlKO8F4Cs2T7AE0S/9Us3DYC20Bm6qgUGTIWjfx9NDmwJnUdEEku3AQLIawHImn3Yo2fGx+XzuOUknbwLqX0BTnoHPJ3TvAAR6RkVgADyUwDMrMnsGw6/B/rl5ZhlajfYEDpDT9wLB42H1Ap4JHQWEUkWg4MxS9TutKWg9wXArE8G/mrw9TzkKXtjoT10hp5qjOYF7H9HtMd3LnQeEUmMAc2wT+gQ5aZXBWC52cAMzATek6c8ZW8y9A+doTdyUH0OnPwpuC8Xk30NRCT+tCxw8fW4ACwx618ZbdxzZP7iyAjYNXSGfLgGjtwL1jdqHwER6QLXPICi61kBMOvTF64FjspvHKmAETvBktA58mEp7LInHHh1NEqUyLkNIlI000IHKDfdLwBmqQz8HTgp/3EE4AhYGDpDvjhUXgQnng7PtcGrofOISGyNzJiVxAhoUnS7AGSiTXxOL0AW6XAqrA6dId8egAN2g5q52lVQRDqn2wBF1K0CkDX7APDFAmWRDsfAyNAZCmE11B8Cx3weZnqJ3OYQkbxSASiiLheAjNlkhysKGUYi/WDCOHg5dI4CsT/CiROhdUm0s6CICAA5ODB0hnLStQJg1ge4Guhb0DTylgthQegMhbQMdp0Eh38N7nRYETqPiIRnsLuZ1YbOUS66VACa4EfA5AJnkU2cAUNCZygCuwyOnQSrl8L9ocOISFgG6eM1ClA0OywAWbPDDS4sRhh522CYPLZ0bwNsZimMmghTfwG3OmRC5xGRcA6AfUNnKBfbLwBmFQ6/AKw4cWQTqZ+V+G2ALVR8E06eBNnX4e7QYUQkjOEwIXSGcrHdApCBC1AbC+YwOGggNIXOUUxLYcw+cNSn4f52eD10HhEprg0wysy0qVwRdFoAMmY1wLeKmEW2YFDzP/Bk6Bwh/BWmj4aBD0frBiR2gyQR6Z4+UIHmARTF9kYAPg3UFyuIbNtHYbRBa+gcIayB9Clw7Bnw9Hp4MXQeESm8AeDA9NA5ysE2C8ASs/4OFxU7jGytEnY/v8xnyN8PU3aFUVfDv4Bs6DwiUjgdY/8qAEWwzQLQD843GFrsMLJt34VdKmB96BwhtUH/i+CUiZB9Bf4N5EJnEpH8S0WTzqeaWUXoLKVu6wJgZjk99hcrVbD7V+Ge0DniYCmMPgiOOwueXAvPh84jIvm1JvprELBP0CBlYKsCkIGpBruHCCOd+wzs21/PyL/lHjhwF9jjx/DvHCwPnUdE8qP57S91G6DAtnUL4INFTyE7lIJhv4RHQueIE4fq78Nxe8K6WXAbZTpZUqSUrH573ZnDgwYpA5sVgEXRs5fvDpRFduAsmLozzAudI25WwK7HwEnTYfZSbTAkkmgLoLrjy2lmpkXoCmizAjAAjgRqwkSRLqi5C5aiCXDbNBv2nQhHnA0PrCvT9RNEku7Ft69BQ4E9QmYpdZsVAIcTQgWRrhkCh30mmgUvnbgLpu0Mk78Gd7bDwtB5RKTrXtn8CTTNAyggc/e3vsmYvQiMDxdHusJh2e7Q1gQjQ2eJu76Q+RU8eBYcZpAOnUdEOuewsgEG+dvzAGa4u+alFchbIwBZs1Ho4p8IBjvdDrND50iC9ZD+GJw6FtbNhNuBVaEzici2rYB5vvnmcxoBKKC3CkAODgkZRLpnLBz3IbgjdI6kyMKI98IJ46HxUbgVWBc6k4hsbhas3OKlMWa2c5AwZeCtAmCwX8gg0m12KUwZBXNDB0mSN2HMSXDyZHjteZgJtITOJCKRmdB3Gy9rFKBANp0EqAKQMAb198PqyrcWz5KuWgR7Hg4nHgQvzYsmVbaFziRS5lqug4nbeH1a0ZOUCRWAhBsI+18Hd4fOkVSvwN4HwnGHwNzZcBcaERAJYjnMXhktAbwljQAUSAqg2SwNDAmcRXpoOpx8LtwZOkeSzYWJ0+GY/eDljlUFNUdApIj+ufX9/40mmVldUcOUCXN3MmaTgWdCh5Gey8Hyg2H5vG0PoUk3DYNXfgcvTY2WI93WbyUikj8bxsPqN6G+k5+f7u43FzVRGdh4C0CzLBMuBUMeBBsEb4TOUgqWwrhT4ZTdITsTZro2YhIpmJfhqe1c/EHzAApiYwHYJWgKyYtqmPAULKjQ8HXerIBd3gsnjoL1f4Kb22F+6Ewipebr0H97P98bjs2YnYT2BsirFIDD8NBBJD/q4bA7osls2i8gj1bD8M/CaTvB8Evg3rXwVOhMIqUgC0/PhH22957lMAG4NQOzMmbvxayySPFKWgrAYEDoIJI/+8Gpl8ItoXOUohz0vQKO2Bn2PRPuXxBNvtQjhCI99JkuvGcp9GuFN4mKwp8z8HLW7KIlZtsdOZDt23gLYFuLL0iCfRhO+kC09K0URuo+mL4/HHswvPBktLqglhkW6YZl8OStsG9X3vva5vObRjv8vC8syJp9daWeEuiRjSMA/UIHkbyr+gVMPzW6HSAF9DJMPg5OHgVrLoc7WmBO6EwiCbDujG5s0PUItG7j5SEO32qHhVmznzZp2eBu2TgHQAWgNPWfAQdMhwdDBykHq2DYl+H4YTD2A3D361H52hA6l0gcXQePzoXduvr+f0Ptdn480OFii24N/GSV2faeKJAOG9cB+AtwbugwUhgOjUfD/GfgwNBZys0wmPcdePlMmJCCUaHziMRBMzy7O0xog6qufqYeWl6G6q6ewuAnrfDzIe6rexiz5G0cAVgfOogUjkHDXTByHDwXOku5WQpjPwonDoWG/4LbV8B9aNKglDGHzJHQ0J2LP8AKqN4Ai7v49hqHb1fBKxmzz2DW1eJQVjbOAVgbOogUVgpGPAQDd4UXQ2cpRzkY8Ac4YXc4fC+Ye320psBLoXOJFFnbBTBvIYzoyYcXwJLuvN9hJ+BXGZiTMXs/ZqkdfqiMbPwfQwvHlIFKGPMU9NsdZoXOUs4Ww8SPwmlDYNxZ8Phz0W6E2dC5RArtUnjgWjigp59/ENp7+NExwNUZmNVkdmJPz19qNhYALXNaJlIw+mEYupcWsomDinvgwCPguBHQ8n24dSU8hBZxkhJ0PdzzXTiyN8e4c/vLBXfFZIPbMmY3Zs1G9/JYiWfuTtbsPIerQoeR4nFYehwseAoOCZ1FNjcGnv0KLDwVRlfD3qHziPTWtXDPx3t58QcYDG0LoALIx5LAa4HvpeEnuJfl0zrm7jSbHZPTdrJlx6HxdJjzoDbaiKvcXvDE/4NlR8MelbBn6EAi3eRXwX0XwxH5OuBieK0v7Jqv4xnMzcFn69zLbuE0c3cazfas0OIl5SpzDsy6A44OHUS2q+0geOzL0DQNJlVE9zRF4mztJfDMFXBoPg96PzwxqRfzCDpjcF0OLq5zfz3fx44rc3cw65OB1YA2WChPa/8f3PUbOC10EOmSDUfBo5fA6v1hgsqAxE07LD4Tsg/CxHwf+1J47MNwUL6P22EN8O00/BT3ba08WFKiAgBkzGZTgP9Ykhjtf4MbPgln8fbkUIm/9vHw9OfgtdNhl76wP/rvJwG9Do8dDeNWQEHW5z8TXvp94W+HPWdwXq370wU+T1CbFoC/AueEjSOhPQX/PB6Oz2l56CTyXeC5C2Hhu6CuNhom7RM6lJQHhzX/C09+FaZ7fibpbdMIWPs8FGMXwPXA19JwKe4l+WTOpgXgK8B3wsaROFgKd+0P+67v/SM3EtBgeO3DMPtDUDUq2kZ1SOhMUpqWwOMnw8ieLvDTXcshW7H9vQHy6YEUfKjGfV6Rzlc0bxWAJrPjDO4InEdiYg08sT/ULe/GZh0SXylYPQ1mfQSyR8PQgdEWrBodkF5pgde+AouvLPLjxC/A88NgryKecg3w32n4PzZeNEvAWwVgmdmA6mhBoG6tzyylKwcLToVFj+gxwZIzAF47G174AOQmw7gK2CN0JkkOh6YZ8NwlcMiGAEXyH/DoMXBwsc8L3OFwfp37ogDnzjvbtMxkzB5GC8PI5tZ8B+74KZxJAe/rSVDto+HZj8AbZ0KfkTDBQPuqy1Zy0PQPePaLcMAqGBgqx8Uw66uwX6DTZw0+XOt+Y6Dz582WBeAHwJfCxZGY8kfgxlOjyYEDQoeRgmsZB8+9B5acCpXjYLcK2B0VwLLVAgv/AAu/A1PWxODfgCNg/g1hH3914Cdp+B/cE7u752YFoNns6BzcFTCPxFgG7p8Cu2RhdOgsUlS5YTDnLFjwDmAyjKiK7r9q3ZDS1vI6PP0T4M9wQC5Gj5cW8UmAHbmvHc5pcO/WLoVxsVkBwKwyA8so0PObknzt8MrxsGwWHBY6i4QzCOYfA/NOhrWHQv9hMKYimjCqUYKEWwXPXw1NP4O9CvUsf2+lgEZoAapDZwGWGpxT635v6CDdZVtOaMyYXQ28P0wcSYjVv4aZX43mBei3QAHI1cHLx8JrJ8H6Q2DgUBhjGi1KhA3wyu2w6Acwek5C/psthtf7wi6hc3RoA76Shh8n6SmBrQpAk9m7DP4RKI8kyEK4bRpMXgMjQ2eRWGobCi8dC4uOhpZ9oXpnGFYNYwk4gUzAYdVCmH0DtM6AscV6fj+fXoEX62BC6Bxb+KfBh2rds6GDdMVWBaDjccAlwKAwkSRJ2mHuabDkkTzu9iWlzSC7B8w7DJZPg5Z9oO9I2KkSSpbVAAAZn0lEQVQaxhGDCWalyGFNE7zyOGRmQPoumNia8Ee+X4TndorndtkvGJxc674wdJAd2aoAAGTNrnT4SIA8kkzrroJbLo5uCST6HxUJJwVNe8C8AyCzH6yfBKnRMKAWGqqjod5irfyWdLl18OrLsPRO8Ntgp6dhbDtUhA6WT7PhmeHRCpdxtDQFp9W4PxE6yPZsswBkzKYD9xU/jiTZUvj3VBiX1e50kn9r62HhJFi+L6zeB9omQNUwGDgA6qqiZauHEqOZ6kXQ1gKLlsCyObDuUah6FOqegV3XlsFIysvwfH1xVwPsrjXAuWn3m0MH6cw2CwBmloG5RENyIl3m8PqF8PRf4FQ0I1yKp7UC3hwOjaNh5e6wdjfYsBukdgYbCv0Hw6A+MDgVzT8YTPznIaxpgeXNkHkT1syDtrlQ8RL0fwnSc2HnlnjMgg9iPrxUU/hdAXurHfhc2v2y0EG2ZdsFAMiYfRH4YXHjSInwF+Cm4+CgdTA8dBiRbcikYGUa1jTAuvroT8tQaBkCbQ2QawD6Q6oPVPaBDSlI9YN+VVHZyFVD/0qgEtoNqiuhb+UWc6faoa0VWgHWQmsLtK+E9jXRML0vB8uCvQFVb0DfJTBgKQxeDrUboG+I/2GSYhG82j8he5UY/LQW/jtuuwp2WgBWmtW1w2uUwVCSFEYOXv4AzL4tmhsgIpI3b8KKygTtWOpw/Up432j39aGzbNTp/bLB7k3AjCJmkRKTgt3/DKfeDjf2gcbQeUSkNPSBXGVMFynqjMFZNfDPRWb9QmfZaLsTZnLwS6I1j0V6qvJAOHMhLJkK/wkdRkSSb2dYQTLnGB0/EG5aYhaHZYy3XwDq3ecAsZ3BKMlRDXvfAtNnwvX9onUmRER6ZEK0ZH0iORzbF25ZZhb89voOH5lJwTfRKIDkR9VBcNbrsOEDcCMQqwkxIpIMR0Bz6Ay9dFQ1zGw0C7rg3g4LQI37U8AtRcgiZSIFo38BZ74I9+wEc0LnEZFkOag0FjWaVgG3NZkNDhWgS4tmaBRACmEnOHo21P8/uBbYEDqPiCTDWBgSOkOeHGYwM1QJ6PQxwC01mV1v8I4C55EytQruPw14FqaHziIi8TUUsnOghmROAtwmgztr4RTcW4p53i4vm1kB/020/7JI3g2C6ffAIffCzTWwIHQeEYmns+BlSujiD9HEwAxchVlRl7Lu8slq3OcBlxcwi0jV3nDaq1D9VbjWYG3oQCISL2d3rKxYgs7JwPeLecIu3wIAaDZL5+AVErYAgyRTCzx9Hiy5A06kxBq/iHRfFbQvgZUpSIfOUigGF9e6/7wY5+rWcEONe8bhO4UKI7Kpatj3Gjj+UbipAV4InUdEwjoTni3liz+Aw6VNZu8qxrm6NQIQfcIqM/AE8d2HWUpT081w5wVw2HoYGTqMiBTfg/DQBJgaOkcRrAeOT7vfX8iTdL8AACvMDkzBI5TX3tsSAw6LZsBDX4Dj26E2dB4RKY6h0DQH+lM+uyQ2peCAGvf5hTpBjy7g9e6PA7/NcxaRHTLY+YPw7qWw9FPR+gGx2VlLRArnu/A85XPxB6jLwfWF3DyoRyMA8NaEwNlov3cJaA3c/35Ycy+cgCYKipSkamh5A5oqYFjoLAFcnnb/RCEO3OMh/Br3DHBBHrOIdNsAmH4DHP8C3LY33BM6j4jk39fhkTK9+ANckDU7rxAH7vEIwEZNZn80+GCe8oj0Rq4R7noPtM3So4MiJaEvrHsdmsu4AACsT8FhHXvz5E2vC0DWrNbhOWDn/EQS6bXW12HmOVDzIhweOoyI9NzlcPfZcFToHDHwisGBte7ZfB2w1wUAoMnseIOZ6DcuiZfWhXDbOTDgJTgmdBgR6Z7d4I0nouf++4fOEgcG19a6n5234+WjAABkzH4MfCEvBxPJr5YFURGom6vNhkQS4zl4bCQcFDpHzJybdr8mHwfKWwHArCoLDzocmJ8DiuRd61K446NQ+RAcS2nsKS5Skj4ND3wbpoXOEUONrbDXUPdlvT1Q/goA0Gy2Ww5mAUH2NhbpqnXw5Ldg8eVRESjYc7Yi0n2j4LWnYJCV+LK/vXBT2v2M3h4krwUAIGN2DvDXvB5UpEBa4PHvwsJfw7E5rSwoElwltL4ML9bA5NBZYq7XtwLyXgAAmsx+bnBR3g8sUiA5mHMlPPM1mLZBew2IBHMr/OcQODp0jgTo9a2AghQAzKoycBeacCXJs+QRuPvjsPMiPUIoUlRfhbsv1iN/XWZwXa17j3cOLEwBAJabDauMdg3Ub1OSRC1L4c7PQe4OOA7oEzqQSCk7Ax77A+wLVIfOkiQ5OK7e/c6efLZgBQCgyexQg7vRP56SYK3w5P/C3O/BtBbYJXQekVJzODx3A+xmMCB0lgR6Jg1TcG/v7gcLWgAAsmbnOVxV0JOIFMeS++H+T8GoN+Dg0GFESsEBMPt2GKEZ/z3n8NE69yu7+7mCFwCAjNl3gf8p+IlEiqN9DTz6M1j+Szi0DYaGDiSSRFNh9s0wzKA+dJYkM1iWgz3q3Fd263PFKACYWQb+ApxT+JOJFI/D4lnw8Oeg3/PRlsRaXEikC06AWX+BcQaDQmcpBQ7frnP/Wnc+U5wCACwx698P7tFKgVKi2lfD/T+H5ZfBYS0wInQgkbj6BNzzvWiJX63xnz9rHfasc1/U1Q8UrQAArDYb2goPAWOLdlKR4ls6Cx74Mgx+LHqUsG/oQCJxYJD7I9x5WvRkjTaPyzODK2vdP9rl9xezAAA0m41th4dM902lDLTBs7fBi1+DXRdGEwdToTOJhDAImu6F2aO1PkwhtQLj0u6vdeXNRS8AAM1mU3LR44G69yPlIrcBnrwG5n8Lds3AIaEDiRTLPvD87dCnGnYPnaUMXJZ2v7ArbwxSAACazI43uBkt+iDlZ91yuPfnsOZKOLgFdg4dSKQQDNp+BHedD0egW2HFsr4VRndlieBgBQCgyexdBtegmdNSvlYsg3svg/W/gwM36DckKRFj4eU7oDkNB4TOUm4cvlnn/o0dvS9oAQDImn3Q4ffo3qhI81J46Lew9v9g73WwR+hAIt1VARt+APecD4cBA0PnKUcGy2phFO4btvu+0AUAIGP2SeDXaFaoyEZrVsJ9M2D5pbBHczSBUP//IbF2FDzxJ+jfDyaGzlLuDD5U677dVXhjUQAAmsy+YPDj0DlEYmj9Snj4Rmj8FQybFz0/rf01JDZ2hXnXwMLx0U5+Kqrx8FDa/bDtvSE2BQAgY/Zp4Ffo/4BEOuUw/yV4+jfA3+FATSKUUOpgye/h2cOj9S76hc4jm8vBxHr3Fzv7eawKAKgEiHRTphEe+zus/A3sujiacKVJtVJQ9bD4V/DsCXCIQW3oPNKpH6fdv9jZD2NXAACazM43uAJNDBTpjlwbPP04zL8aqm6E8es1kVDyaBjMvwJemhZN8NM6LvG3OA274J7b1g9jWQAAMmbnAFcDlaGziCRUWwu88DTMvwoqb4CJ62FM6FCSPIfC0z+CxknRhV9D/clyeNr9/m39ILYFAKDJ7GyDPwNVobOIlIDVa+CJu2H5VTDwHtinXZsWSSf6QeZCeOyzMKQ/7B86j/TYr9Lun93WD2JdAACyZqc7/B3NehbJt+Y18PST0Hg9VN4Eo7KwFxp1K2ft0+GJb8HKfaKdW3V/P/ne6LgNsNXFPvYFACBrdpTDTWhRCZGCcpi/COb+B5qvgZrHYb+cNu4qde37w7NfgGXHwthKrUZZcgz2rXV/ZqvXk1AAQCVAJJAVK+G5WbDiDqi4A4bMgwlAXehg0nMpWHcSPH4RrNsfJqX0KGmpuyTt/sMtX0xMAYC3dhG8BRgWOotIGWtcB3PmwPL/QG4mpJ+Gse0wKnQw6dwQmPcumPdesImwj7ZkLyv3pN2P2vLFRBUAgKzZaIdbiX4LEZF4WNsGLyyAJY/A+geh38NQ/xqMA4aEDleOhsArZ8GrZ0NuLxhVDXuiR6vL1fo01G65N0DiCgBAs1k6BzcQbTEpIvHV3AbzlsCy2bD2Uai4D2pnwy4tMBotWpQXBqv2hJePgTfPBPaGXathPLrgy9umpd0f3PSFRBYAAMz6ZKJdBN8bOoqIdFurw/xmWLwIVs6Ftuch9RwMeBHqFsNIdKtvm/rDa4fAwmNg5XSoGAsN/aIFnwaHziaxttU8gOQWAAAzy8B3gS+HjiIiebXOYcFqWL4EVr0CLXPAXoK+C6DfGzB4CTR4dHuhb+iwedbWF97YA5ZNhubJsGEi2BjoPxR2roDd0MiJdJPBtbXuZ2/2WqILQIeM2QXAZej5ZZFy0gYsb4emtZDJwppGaHkN2hcCi6GqCaoaoWo5VGdgYDP0XxM9STSI4j5R1AasSEN2J1g1HNaOhPUjoG1naN8VGAP9GqCuXzTyoQWaJK8M5ta677nZa6VQAAAyZicDf0OPCYrI9rUDK4FsO6xrjf60tEJbO2xwsBaoaoU1Oci1QmUrpNbBWoAN0MfB+sL6SqjsB1XV0FoFfasgVQntVTCoCtpT0KcPDDRIW/TopH5JkVBy62HQcPe1G18omQIA0Gy2f8djgsNDZxEREYmTFEypcX9qk+9LR437U+3RdqgPh84iIiISJ+3R/JG3lFQBAGhwX5yGo4i2ExYRERHASr0AAOC+Ie1+AfAJoCV0HBERkRgYvek3pVkAOqTdL0/BVOC10FlERERCsi1W5SzpAgBQ4/5kVTQv4J7QWURERELxcisAAAPdl6fhBODy0FlEREQCqd/0m7IoAAC4t6TdP2FwHrAudBwREZEi67/pN+VTADrUul/tcDSwKHQWERGRIuqz6TdlVwAA6twfqYR9gZtDZxERESkSFQCAQe4r0u6nG3wQ3RIQEZHSt9nSv2VbADaqdZ/hcCAwO3QWERGRAtpsXZyyLwAAde6z2+AQ4OrQWURERApEBWBbhrivTruf13FLYHXoPCIiIvlk0Lrp9yoAW6h1n9EOU4BZobOIiIjkSy7aBvstKgDb0OA+Nw2HOvySLSZNiIiIJFEKMlt8L9vkvqHO/SLgDINloeOIiIj0hqsAdE/a/WZgPJogKCIiyda06TcqAF1Q655Nu58HnAusCJ1HRESkuxze3PR7FYBuSLtf0wqTgBtDZxEREemm1zb9RgWgm4a6L0u7v8Ph3WwxnCIiIhJjr2/6jQpAD9W5/6Md9gJuCZ1FRERkR1wjAPnT4L4kDacDn0KLB4mISHzlWrYoAOaux9zzodlsbA7+AEwPnUVERGQL89Puu236gkYA8qTGfV4ajuhYSlhPCoiISJxsteGdCkA+uXut+4y2aG6A1g0QEZG4eGHLF1QACmCI+9KOdQNOBRaGziMiIuXNNAJQXGn3f62HiQ7fZItdmERERIqlDR7d8jVNAiySrNk+DpcDB4fOIiIiZSWbhjq2uOBrBKBIat2fScNU4AJgVeg8IiJSNh7Z8uIPKgDF5Z5Lu1/h0XLCN4WOIyIipc+3MfwPKgBB1Lm/nnY/w+AsYH7oPCIiUroM7trm65oDEJhZdRY+6fBtYFDoOCIiUlJWpaEe960momsEIDT3llr3X7TDeKK1A9TIREQkX+7Z1sUfVABio8F9cdr9PIMjgadD5xERkeQz+HenP9MtgBgyS2Xh/Tn4scHQ0HFERCSR3GBMrfs2F6TTCEAcuedq3WekYE/gh0BL6EgiIpIsBo93dvEHFYBYq3XPpt0vaYfJwMzQeUREJDkcrt3ez3ULIEGazN5p8ANgXOgsIiISbykYW+P+6nZ+LklR535dGiYCn3F4M3QeERGJrYe3d/EHFYDkcW9Nu/+6FXYDLgFWho4kIiLx4nDljt6jWwAJt8qsoQ2+AFwMVIfOIyIiwa1uhxEN7tvdd0YjAAk3yL2xY6Lg3gb/QAsJiYiUNYNrdnTxB40AlJwms6kGPwIOC51FRESKLwcH1bs/vqP3qQCUqBVmx6bgUqJHCEVEpDzcnXY/uitv1C2AElXvfmcapjh8HOh0IQgRESkpP+nqGzUCUA7MqrJwrsPXiZ4eEBGR0vN8GibTxQu7RgDKgXtrrfuMjjUELgTeCB1JRETyy+BHXb34g0YAypNZdQY+RDQiMCJwGhER6b2X0rAX7m1d/YBGAMqRe0va/Yo0jAEuAJaEjiQiIj1ncEl3Lv6gEQABlpj17wcf82hlwWGh84iISNcZPF4LB3dn+B9UAGQTy80GVsKniVYWbAidR0REdszg6Fr3u7v9ORUA2dJys4EVcIHB59EcARGROPt72v09PfmgCoB0zqw6C+c4fBkYHzqOiIhsZlUOJtS79+jJLk0ClM65t3Q8PjgJON3gsdCRREQk4vCNnl78QSMA0k1NZidYNFnwyNBZRETK2LNpmNLdmf+bUgGQHsma7efRFsTvBSpC5xERKSOtKZha4/5Ebw6iWwDSI7Xus9Lu51XAeIdfAhtCZxIRKRPf6O3FHzQCIHmSNRuVg4sNPgIMCp1HRKREPZyG6bi39/ZAKgCSV01mg4HzDT6DNh4SEcmn1RWw/2D3l/NxMBUAKQyz1Ao4OgUXAacAFjqSiEiSOZxT5/63fB1PBUAKLmu2r8MngQ8A/ULnERFJGoOf1rr/V16PqQIgxbLabGgrfJhoS+KRofOIiCTEQ2k4EvfWfB5UBUCKz6xPFs716PbAvqHjiIjE2KJWOGCo+7J8H1gFQILKmh2ZgwsNTgcqQ+cREYmRZuDwtPuzhTi4CoDEwnKzYZXwQeATwOjAcUREQmt1OKXO/d+FOoEKgMRLx9MDFfBxh3egUQERKT9u8KFa9xmFPIkKgMRW1my0w8cNPuKwU+g8IiJF8sW0+48LfRIVAIk/s4oMnGzwWYdj0JoCIlKiDL5a6/6dopxLBUCSZKXZ7u1wPtGfhtB5RETyxeBrte7fLtr5VAAkiRaY9a2Fsz3ae+AINCogIglWzN/83zqnCoAkXdZsNPBBh/PQ/gMikiwOXJJ2/1GxT6wCICWl2WxKDj4OnIt2JRSReGtz+ESd+5UhTq4CICVpgVnfwXCaRaMCJwEVoTOJiGxiNfDutPttoQKoAEjJy5qNAs7zaKGhsaHziEjZW5qCU2rcnwoZQgVAyoeZZWCawYcc3gUMDh1JRMqLwWM5eFed++vBs6gASDlaYNa3Bo4DzgbOAgYEjiQipe/qNXDBzu7rQgcBFQARFpn16w+ndswXOB6oDp1JRErKBocL69x/GzrIplQARDax0qyuDd4JnGPR+gKaPCgivTEvB+fWuz8eOsiWVABEOrHKrL6jDJwHTEWLDYlI91zdBp8a4r46dJBtUQEQ6YIms11ScJZHcwYOC51HRGKt0eBjte43hg6yPSoAIt3UsR/BO4AzgYOBVOBIIhIft7bB+UPcl4YOsiMqACK9sMqsoR1O7hgZOA7oEzqTiASx1OBLte4zQgfpKhUAkTxZYta/b7Rd8dnA6UBN4EgiUngO/KkSLh7kviJ0mO5QARApBLM+K2C6RcsRnw0MDx1JRPLu2Y61/B8OHaQnVABECs0slYGpBmc6nAGMCx1JRHplKfCNNFyJe1voMD2lAiBSZM1mu+XgWINjHU5EuxaKJMVa4FcO36tzXxk6TG+pAIgEtMisXz84LAXHAqcBE0NnEpGt5IA/t8OXGtyXhA6TLyoAIjGy0mxcDk7yaAvjI4F+gSOJlLM24C85+H69+5zQYfJNBUAkphaY9R0E0zpGB44FpoTOJFImWoC/VcC3B7u/HDpMoagAiCREs9nYdjja4CiiP8NCZxIpMWsdrnD4Sb37G6HDFJoKgEhCbZxMCEwDjgZGBo4kklRvOPyuCi4b5N4YOkyxqACIlIgtni44BqgLnUkk5h50+EUd3JDkx/l6SgVApBSZVTTDvu1wVMctg+nocUMRgCaiGf2/bnB/KXSYkFQARMqBWWUz7Osw1eEQoh0Ndw0dS6RIWoBbDWbUwr9wbwkdKA5UAETKVKPZ8Ao4gKgMTCN6yqBv2FQiefUCMKMK/jDQ/c3QYeJGBUBEgOixwxqY4nAo0dLFh6InDSRZ3OAJh+vb4foG97mhA8WZCoCIdKrZbEwOpgIHA/sD+wADw6YS2Uy7w70puDEHN9a5vx46UFKoAIhI15mlVsAeqagM7Oewv8F+QDp0NCkrjcBdBjMr4OakbcMbFyoAItJrjWYjKqLbB1MsmkswBW2BLPmz3uABhztTcGcNzMI9FzpU0qkAiEhBdJSC/SwaKdgbGA/sCfQJHE3iby3wJNFz+v9ZCw/s7L4udKhSowIgIkXVaDbCYGIFTPJo98NJwGS0TkE5W0J0wX8AeDANj+O+IXCmkqcCICLhmVkWRuWiUYJJKRjfUQ4moPkFpeY14BngWYdZDo+Uw7r7caQCICKxttps6AYYk4IxdPwxGOMwGhgFVAUNKJ1ZB7zg8GwquuA/Y/BMjXsmdDCJqACISKI1m6WB3dphN4Pd6Pjbo69HARVhE5a0VuB1g1cdXiX680IKZtfAAk3UizcVABEpXWZ9mmAoMDIFQx2GGwzzaIGjEXT8rONvTU7cWiOwmGjY/g2Lvl6Yg8UV8GoNLCzHTXRKhQqAiAiw0qyuDYZVwLAcjHAYalAP1HT8GbzF1+mOr1PBQnffKqDRYLnDCmCFw4pUx98OjSlYloLFK2GRZt6XNhUAEZFeaDQblNq6IAyyTSYvOgy0jrkKBn0c+nf8yIDaTQ43yKCy4zM5oHnTczmsM1i/yUsb37PGo9ebDdakOr5ugzUV0TP0zTWwRpvgyKZUAERERMrQ/wdZXTniB97EaAAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "rhbk-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "rhbk-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "name": "rhbk-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "RELATED_IMAGE_KEYCLOAK",
                                                            "value": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003"
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKREALMIMPORTCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "rhbk-operator"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                                                    "imagePullPolicy": "Always",
                                                    "name": "rhbk-operator",
                                                    "resources": {}
                                                }
                                            ],
                                            "serviceAccountName": "rhbk-operator"
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloakrealmimports",
                                            "keycloakrealmimports/status",
                                            "keycloakrealmimports/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloaks",
                                            "keycloaks/status",
                                            "keycloaks/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "Keycloak",
                    "Identity",
                    "Access"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://www.keycloak.org/guides#operator"
                    },
                    {
                        "name": "Keycloak",
                        "url": "https://www.keycloak.org/"
                    },
                    {
                        "name": "Keycloak Discourse",
                        "url": "https://keycloak.discourse.group/"
                    }
                ],
                "maintainers": [
                    {
                        "email": "keycloak-dev@googlegroups.com",
                        "name": "Keycloak DEV mailing list"
                    }
                ],
                "maturity": "stable",
                "nativeAPIs": [
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "version": "v1"
                    }
                ],
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "keycloak-rhel9-operator-ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a-annotation"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "rhbk-operator"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003",
                        "name": "keycloak"
                    }
                ],
                "version": "24.0.11-opr.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:12Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:12Z",
                        "lastUpdateTime": "2026-04-03T00:12:13Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:20Z",
                        "lastUpdateTime": "2026-04-03T00:12:20Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:20Z",
                "lastUpdateTime": "2026-04-03T00:12:20Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloakrealmimports.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "72d1c635-d836-4815-a44f-0fd43f09b129",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloaks.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "b1b95975-c4a2-4c82-aa9e-8cfda4734a8e",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "message": "Native API exists",
                        "name": "v1.apps",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "message": "Native API exists",
                        "name": "v1.networking.k8s.io",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhbk-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:18Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "rhbk-operator",
                "resourceVersion": "19685",
                "uid": "b793ded7-a614-4453-b8ca-55270b6b2844"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "18292",
                "uid": "3e5a4a12-37ba-47c3-9a38-0f4b9583fea3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16955",
                "uid": "34ba4c80-884b-4a4e-be85-cd76f1c669da"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:28Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "rhtpa-operator",
                "resourceVersion": "19560",
                "uid": "e9f4834c-7135-4b68-9f01-402821fba44d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:22Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "rhtpa-operator",
                "resourceVersion": "19767",
                "uid": "85a5681d-5c4c-466a-9bc9-d668458018ba"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18704",
                "uid": "f09ecc03-adfc-47e8-8640-9809a0a54572"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18693",
                "uid": "4faaf7fb-b7a0-4deb-afec-fd6f1d251e8d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:33Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19509",
                "uid": "afdf5c30-b7e7-4449-9043-24c54a5fe347"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:25Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19703",
                "uid": "a7a97013-9024-4fc9-b4b3-fdb24bb22d2b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "18489",
                "uid": "7dfb687b-0304-48cc-b4f5-8729fc3cb179"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-keycloak",
                "resourceVersion": "17098",
                "uid": "4052b46d-a7fa-4666-96dc-6c8d7bc1a465"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-keycloak",
                "resourceVersion": "19737",
                "uid": "5dbdc1b5-5f5b-41a5-86b1-376658c94b2d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"Keycloak\",\n    \"metadata\": {\n      \"name\": \"example-keycloak\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"instances\": 1,\n      \"hostname\": {\n        \"hostname\": \"example.org\"\n      },\n      \"http\": {\n        \"tlsSecret\": \"my-tls-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"KeycloakRealmImport\",\n    \"metadata\": {\n      \"name\": \"example-keycloak-realm-import\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"keycloakCRName\": \"example-keycloak\",\n      \"realm\": {}\n    }\n  }\n]",
                    "capabilities": "Deep Insights",
                    "categories": "Security",
                    "certified": "false",
                    "containerImage": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                    "createdAt": "2025-03-26T02:27:51Z",
                    "description": "An Operator for installing and managing Keycloak",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhbk-operator",
                    "olm.operatorNamespace": "rhbk-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"Keycloak\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"KeycloakRealmImport\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhbk-operator\",\"version\":\"24.0.11-opr.1\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "repository": "https://github.com/keycloak/keycloak",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "rhbk-operator.v24.0.11-opr.1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "18517",
                "uid": "323c49eb-70ff-4d12-8e8a-b630d5e9d1f8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents a Keycloak Realm Import",
                            "displayName": "KeycloakRealmImport",
                            "kind": "KeycloakRealmImport",
                            "name": "keycloakrealmimports.k8s.keycloak.org",
                            "version": "v2alpha1"
                        },
                        {
                            "description": "Represents a Keycloak Instance",
                            "displayName": "Keycloak",
                            "kind": "Keycloak",
                            "name": "keycloaks.k8s.keycloak.org",
                            "version": "v2alpha1"
                        }
                    ]
                },
                "description": "A Kubernetes Operator based on the Operator SDK for installing and managing Keycloak.\n\nKeycloak lets you add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.\n\nThe operator can deploy and manage Keycloak instances on Kubernetes and OpenShift.\nThe following features are supported:\n\n* Install Keycloak to a namespace\n* Import Keycloak Realms\n",
                "displayName": "Keycloak Operator",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "rhbk-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "rhbk-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "name": "rhbk-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "RELATED_IMAGE_KEYCLOAK",
                                                            "value": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003"
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKREALMIMPORTCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "rhbk-operator"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                                                    "imagePullPolicy": "Always",
                                                    "name": "rhbk-operator",
                                                    "resources": {}
                                                }
                                            ],
                                            "serviceAccountName": "rhbk-operator"
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloakrealmimports",
                                            "keycloakrealmimports/status",
                                            "keycloakrealmimports/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloaks",
                                            "keycloaks/status",
                                            "keycloaks/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "Keycloak",
                    "Identity",
                    "Access"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://www.keycloak.org/guides#operator"
                    },
                    {
                        "name": "Keycloak",
                        "url": "https://www.keycloak.org/"
                    },
                    {
                        "name": "Keycloak Discourse",
                        "url": "https://keycloak.discourse.group/"
                    }
                ],
                "maintainers": [
                    {
                        "email": "keycloak-dev@googlegroups.com",
                        "name": "Keycloak DEV mailing list"
                    }
                ],
                "maturity": "stable",
                "nativeAPIs": [
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "version": "v1"
                    }
                ],
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "keycloak-rhel9-operator-ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a-annotation"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "rhbk-operator"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003",
                        "name": "keycloak"
                    }
                ],
                "version": "24.0.11-opr.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:12Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:12Z",
                        "lastUpdateTime": "2026-04-03T00:12:13Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:20Z",
                        "lastUpdateTime": "2026-04-03T00:12:20Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:20Z",
                "lastUpdateTime": "2026-04-03T00:12:20Z",
                "message": "The operator is running in rhbk-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloakrealmimports.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "72d1c635-d836-4815-a44f-0fd43f09b129",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloaks.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "b1b95975-c4a2-4c82-aa9e-8cfda4734a8e",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "message": "Native API exists",
                        "name": "v1.apps",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "message": "Native API exists",
                        "name": "v1.networking.k8s.io",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhbk-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:16Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-keycloak",
                "resourceVersion": "19613",
                "uid": "f86bf1a8-4eb9-4f0b-8c5e-de6c6013b9ed"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-tas",
                "resourceVersion": "18162",
                "uid": "71aeaac6-c97d-46d7-b2d1-17eac213a5a7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:38Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-tas",
                "resourceVersion": "16838",
                "uid": "5e7ae9a2-b6c2-40a5-abb2-917465e41c1c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:26Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-tas",
                "resourceVersion": "19521",
                "uid": "8147285f-8196-4e28-bc77-24fdd3bf2545"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:19Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-tas",
                "resourceVersion": "19715",
                "uid": "77410f61-83dd-420a-908a-e40172c6e603"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-tpa",
                "resourceVersion": "18061",
                "uid": "fd27e667-4f96-4536-86eb-618eaaf80b70"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-tpa",
                "resourceVersion": "17127",
                "uid": "5bac8452-e55b-47bc-8fbc-0fa02f3fc061"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "19766",
                "uid": "4abd9913-38e0-4c4b-8e07-01a032d7113c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "19664",
                "uid": "7dd7eb77-80d5-41e8-9802-8808b56a4c65"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtpa.io/v1\",\n    \"kind\": \"TrustedProfileAnalyzer\",\n    \"metadata\": {\n      \"name\": \"trustedprofileanalyzer-sample\"\n    },\n    \"spec\": {\n      \"appDomain\": \"change-me\",\n      \"collector\": {},\n      \"database\": {},\n      \"image\": {},\n      \"infrastructure\": {\n        \"port\": 9010\n      },\n      \"ingress\": {},\n      \"metrics\": {\n        \"enabled\": false\n      },\n      \"modules\": {\n        \"createDatabase\": {\n          \"enabled\": false,\n          \"image\": {}\n        },\n        \"createImporters\": {\n          \"enabled\": false,\n          \"image\": {},\n          \"importers\": {}\n        },\n        \"importer\": {\n          \"concurrency\": 1,\n          \"enabled\": true,\n          \"image\": {},\n          \"infrastructure\": {},\n          \"metrics\": {},\n          \"replicas\": 1,\n          \"resources\": {\n            \"requests\": {\n              \"cpu\": 1,\n              \"memory\": \"8Gi\"\n            }\n          },\n          \"rust\": {},\n          \"tracing\": {},\n          \"workingDirectory\": {\n            \"size\": \"32Gi\"\n          }\n        },\n        \"migrateDatabase\": {\n          \"enabled\": false,\n          \"image\": {}\n        },\n        \"server\": {\n          \"enabled\": true,\n          \"image\": {},\n          \"infrastructure\": {},\n          \"ingress\": {},\n          \"metrics\": {},\n          \"replicas\": 1,\n          \"resources\": {\n            \"requests\": {\n              \"cpu\": 1,\n              \"memory\": \"8Gi\"\n            }\n          },\n          \"rust\": {},\n          \"tracing\": {}\n        }\n      },\n      \"oidc\": {\n        \"clients\": {\n          \"cli\": {\n            \"clientSecret\": null\n          },\n          \"frontend\": {}\n        }\n      },\n      \"openshift\": {\n        \"useServiceCa\": true\n      },\n      \"partOf\": \"trustify\",\n      \"replicas\": 1,\n      \"rust\": {},\n      \"storage\": {},\n      \"tls\": {},\n      \"tracing\": {\n        \"enabled\": false\n      }\n    }\n  }\n]",
                    "capabilities": "Basic Install",
                    "createdAt": "2025-11-04T12:03:15Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "false",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhtpa-operator",
                    "olm.operatorNamespace": "tsf-tpa",
                    "olm.targetNamespaces": "tsf-tpa",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtpa.io\",\"kind\":\"TrustedProfileAnalyzer\",\"version\":\"v1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtpa-operator\",\"version\":\"1.1.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Profile Analyzer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "helm.sdk.operatorframework.io/v1",
                    "repository": "https://github.com/trustification/trusted-profile-analyzer-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/rhtpa-operator.tsf-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "17333",
                "uid": "339676fe-4bbf-434b-85ff-d8dd68072dc1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "kind": "TrustedProfileAnalyzer",
                            "name": "trustedprofileanalyzers.rhtpa.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Profile Analyzer (RHTPA) 2.2.3 provides a single source of truth for your software inventory across all your environments. You can verify the integrity of your in-house and third-party applications against their respective Software Bill of Materials (SBOM) document.  Trusted Profile Analyzer provides vulnerability, component and license transparency, strengthens your software supply chain security, and enables an accurate, up-to-date understanding of your software inventory.\n\nFeatures and Benefits:\n\nEnhanced Software Supply Chain Security: Offers critical transparency and integrity verification across the entire software lifecycle.\n\nReduced Operational Risk: Proactively identifies and helps remediate vulnerabilities minimizing risk and compliance violations.\n\nImproved Compliance and Auditability: Simplifies the process of meeting regulatory requirements for software transparency and integrity by providing verifiable documentation and continuous monitoring.\n\nFaster Remediation and Incident Response: Provides targeted, actionable insights to prioritize and accelerate the patching and remediation of vulnerabilities.\n\nIncreased Developer Productivity \u0026 Trust: Integrates security into existing workflows without significant overhead, allowing developers to build and deploy with greater confidence in the integrity of their code and components.\n\nCentralized Visibility and Control: Consolidates disparate security information into a single pane of glass, offering a holistic view of your application security posture.\n\nRed Hat Trusted Profile Analyzer is a crucial tool for any organization running applications on OpenShift that needs to confidently understand, verify, and secure the software they deploy, especially in an era of complex software supply chains and increasing regulatory scrutiny.\n\n[Documentation](https://docs.redhat.com/en/documentation/red_hat_trusted_profile_analyzer/2.2).\n",
                "displayName": "Red Hat Trusted Profile Analyzer",
                "icon": [
                    {
                        "base64data": "PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48c3ZnIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgd2lkdGg9IjM4IiBoZWlnaHQ9IjM4IiB2aWV3Qm94PSIwIDAgMzggMzgiPjxkZWZzPjxzdHlsZT4uZHtmaWxsOiNlMDA7fS5le2ZpbGw6I2ZmZjt9LmZ7ZmlsbDojZTBlMGUwO308L3N0eWxlPjwvZGVmcz48ZyBpZD0iYSI+PHJlY3QgY2xhc3M9ImUiIHg9IjEiIHk9IjEiIHdpZHRoPSIzNiIgaGVpZ2h0PSIzNiIgcng9IjkiIHJ5PSI5Ii8+PHBhdGggY2xhc3M9ImYiIGQ9Im0yOCwyLjI1YzQuMjczNCwwLDcuNzUsMy40NzY2LDcuNzUsNy43NXYxOGMwLDQuMjczNC0zLjQ3NjYsNy43NS03Ljc1LDcuNzVIMTBjLTQuMjczNCwwLTcuNzUtMy40NzY2LTcuNzUtNy43NVYxMGMwLTQuMjczNCwzLjQ3NjYtNy43NSw3Ljc1LTcuNzVoMThtMC0xLjI1SDEwQzUuMDI5NCwxLDEsNS4wMjk0LDEsMTB2MThjMCw0Ljk3MDYsNC4wMjk0LDksOSw5aDE4YzQuOTcwNiwwLDktNC4wMjk0LDktOVYxMGMwLTQuOTcwNi00LjAyOTQtOS05LTloMFoiLz48L2c+PGcgaWQ9ImIiPjxwYXRoIGNsYXNzPSJkIiBkPSJtMjguNDQyNCwyNy41NTgxbC00LjgxODUtNC44MTg1Yy43MTM1LS42OTQ2LDEuMjc3Ni0xLjU1MjcsMS42MjMyLTIuNTMxNi4xMTUyLS4zMjUyLS4wNTU3LS42ODIxLS4zODA5LS43OTc0LS4zMjIzLS4xMTYyLS42ODI2LjA1NTItLjc5NjkuMzgxMy0uNzU3OCwyLjE0MzEtMi43OTQ5LDMuNTgzLTUuMDY5MywzLjU4My0yLjk2MzksMC01LjM3NS0yLjQxMTEtNS4zNzUtNS4zNzVzMi40MTExLTUuMzc1LDUuMzc1LTUuMzc1Yy4zNDQ3LDAsLjYyNS0uMjc5OC42MjUtLjYyNXMtLjI4MDMtLjYyNS0uNjI1LS42MjVjLTMuNjUzMywwLTYuNjI1LDIuOTcyMi02LjYyNSw2LjYyNXMyLjk3MTcsNi42MjUsNi42MjUsNi42MjVjMS4zMjUxLDAsMi41Nzc3LS40MDc0LDMuNjM2Mi0xLjEwNDVsNC45MjE0LDQuOTIxNGMuMTIyMS4xMjIxLjI4MjIuMTgzMS40NDI0LjE4MzFzLjMyMDMtLjA2MS40NDI0LS4xODMxYy4yNDMyLS4yNDQxLjI0MzItLjYzOTYsMC0uODgzOFoiLz48cGF0aCBkPSJtMjAuNDQyNCwyNy41NTgxbC0yLTJjLS4yNDQxLS4yNDQxLS42NDA2LS4yNDQxLS44ODQ4LDAtLjI0MzIuMjQ0MS0uMjQzMi42Mzk2LDAsLjg4MzhsLjkwNjIuOTA1OWMtNC45MTkxLS4yODA0LTguODM4OC00LjM1OTQtOC44Mzg4LTkuMzQ3OCwwLTUuMTY5NCw0LjIwNjEtOS4zNzUsOS4zNzUtOS4zNzUuMzQ0NywwLC42MjUtLjI3OTguNjI1LS42MjVzLS4yODAzLS42MjUtLjYyNS0uNjI1Yy01Ljg1ODQsMC0xMC42MjUsNC43NjY2LTEwLjYyNSwxMC42MjUsMCw1LjY5NDksNC41MDc3LDEwLjM0NDUsMTAuMTQwNiwxMC42MDA1bC0uOTU3OS45NTc2Yy0uMjQzMi4yNDQxLS4yNDMyLjYzOTYsMCwuODgzOC4xMjIxLjEyMjEuMjgyMi4xODMxLjQ0MjQuMTgzMXMuMzIwMy0uMDYxLjQ0MjQtLjE4MzFsMi0yYy4yNDMyLS4yNDQxLjI0MzItLjYzOTYsMC0uODgzOFoiLz48cGF0aCBkPSJtMjUuNSwxNy42MjVjLTIuMjc0NCwwLTQuMTI1LTEuODUwNi00LjEyNS00LjEyNXYtNC4wMjg4YzAtLjI5NDkuMjA2MS0uNTQ5OC40OTUxLS42MTEzbDMuNS0uNzQ0MWMuMDg1OS0uMDE4Ni4xNzM4LS4wMTg2LjI1OTgsMGwzLjUuNzQ0MWMuMjg5MS4wNjEuNDk1MS4zMTY0LjQ5NTEuNjExM3Y0LjAyODhjMCwyLjI3NDQtMS44NTA2LDQuMTI1LTQuMTI1LDQuMTI1Wm0tMi44NzUtNy42NDc5djMuNTIyOWMwLDEuNTg1NCwxLjI5LDIuODc1LDIuODc1LDIuODc1czIuODc1LTEuMjg5NiwyLjg3NS0yLjg3NXYtMy41MjI5bC0yLjg3NS0uNjEwOC0yLjg3NS42MTA4WiIvPjxwYXRoIGNsYXNzPSJkIiBkPSJtMjUsMTQuMzUyMWMtLjE2MDIsMC0uMzIwMy0uMDYxLS40NDI0LS4xODMxbC0xLTFjLS4yNDMyLS4yNDQxLS4yNDMyLS42Mzk2LDAtLjg4MzguMjQ0MS0uMjQ0MS42NDA2LS4yNDQxLjg4NDgsMGwuNTU3Ni41NTgxLDEuNTU3Ni0xLjU1ODFjLjI0NDEtLjI0NDEuNjQwNi0uMjQ0MS44ODQ4LDAsLjI0MzIuMjQ0MS4yNDMyLjYzOTYsMCwuODgzOGwtMiwyYy0uMTIyMS4xMjIxLS4yODIyLjE4MzEtLjQ0MjQuMTgzMVoiLz48L2c+PC9zdmc+",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtpa.io"
                                        ],
                                        "resources": [
                                            "trustedprofileanalyzers",
                                            "trustedprofileanalyzers/status",
                                            "trustedprofileanalyzers/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "services/finalizers",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtpa-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "rhtpa-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "rhtpa-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "image": "registry.redhat.io/rhtpa/rhtpa-rhel9-operator@sha256:cb5b933220b1493a9fd73380d296b3d6f79c594fc28446e0197c9a3b143025ef",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true
                                            },
                                            "serviceAccountName": "rhtpa-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtpa-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "rhtpa",
                    "trusted-profile-analyzer"
                ],
                "links": [
                    {
                        "name": "Trusted Profile Analyzer Operator",
                        "url": "https://github.com/trustification/trusted-profile-analyzer-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rhtpa-support@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.29.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/trustification/trusted-profile-analyzer-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtpa/rhtpa-rhel9-operator@sha256:cb5b933220b1493a9fd73380d296b3d6f79c594fc28446e0197c9a3b143025ef",
                        "name": "manager"
                    }
                ],
                "replaces": "rhtpa-operator.v1.1.2",
                "version": "1.1.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:42Z",
                        "lastUpdateTime": "2026-04-03T00:11:42Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:42Z",
                        "lastUpdateTime": "2026-04-03T00:11:42Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:42Z",
                        "lastUpdateTime": "2026-04-03T00:11:42Z",
                        "message": "installing: waiting for deployment rhtpa-operator-controller-manager to become ready: deployment \"rhtpa-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:56Z",
                "lastUpdateTime": "2026-04-03T00:11:56Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.29.0) less than server version (v1.34.5)",
                        "name": "rhtpa-operator.v1.1.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trustedprofileanalyzers.rhtpa.io",
                        "status": "Present",
                        "uuid": "dd849097-56cb-4262-98d8-289ca7b7a4a5",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\",\"delete\",\"patch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"\"],\"resources\":[\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtpa.io\"],\"resources\":[\"trustedprofileanalyzers\",\"trustedprofileanalyzers/status\",\"trustedprofileanalyzers/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"services/finalizers\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtpa-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf",
                "resourceVersion": "18515",
                "uid": "5c35527b-3932-4aeb-bcff-28ef8bc9e87a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:07Z",
                        "lastUpdateTime": "2026-04-03T00:12:07Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:08Z",
                        "lastUpdateTime": "2026-04-03T00:12:08Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:11Z",
                "lastUpdateTime": "2026-04-03T00:12:11Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "6da487a1-2fb5-4c81-bfa8-06465a28a65d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "dfc07f09-33fc-46f7-821b-58acd67a7d33",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "f447ef93-fa7b-4931-a6af-367a8e387d1f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "b9dd26ab-d3ca-45bb-87f5-eb5dc8e7520b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "03a5d202-159a-477f-bc13-1d7f4ad2611f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "c8423805-b1be-4b9d-8972-7ea3d25cdeee",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "bebfa9ee-c61e-47cf-88d6-c0e3bca4088f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "80e3458d-0b66-46ff-ae43-cbc33a7922af",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf",
                "resourceVersion": "17122",
                "uid": "228ff2e9-cfa7-40f4-b494-75993308e925"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:47Z",
                        "lastUpdateTime": "2026-04-03T00:11:47Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:01Z",
                        "lastUpdateTime": "2026-04-03T00:12:01Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:01Z",
                "lastUpdateTime": "2026-04-03T00:12:01Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "0f04179e-6abf-45b0-bbc2-df2bbaf6e72a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b17a1c67-e478-4468-81b6-83348ffad773",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "a3fc93aa-640a-4e5a-b2e5-3017e0c8538b",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "90d86be7-34af-4fd0-9ea3-cb0c8f9f842e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "43b2ac1e-acbf-403c-b410-f6a971261490",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "b0083e03-34f2-4da0-bbd2-899470861ba6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "46323c27-16ba-490f-b585-3a4952d1b7cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ccf580b7-2be8-4d3c-86ad-d555f70a3f0d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "f140ae74-7a3c-4685-8e2d-a4fc8361b37f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "deaac685-7587-43ef-adb0-8afcd903223a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "dd5e42b8-8830-4708-943b-19aded3f2178",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3533087d-2cd2-45f2-8963-59fd671da2a6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "87100cfb-ef63-4734-9500-a302f0ab33c3",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "3d76eaa8-e950-477a-be46-731682072af9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "6f5eea1c-ae53-4f4c-b728-4e0ae5482375",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:23Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf",
                "resourceVersion": "19764",
                "uid": "43f1b033-2e52-42e8-bf9d-588a1c4888e1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:25Z",
                        "lastUpdateTime": "2026-04-03T00:12:25Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:26Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:26Z",
                        "lastUpdateTime": "2026-04-03T00:12:27Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:33Z",
                        "lastUpdateTime": "2026-04-03T00:12:33Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:33Z",
                "lastUpdateTime": "2026-04-03T00:12:33Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "fef11c51-aa00-4d5f-81dd-c2c2e9e90dfa",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f1fe13f2-66d8-427a-84ad-e07348b0cdfc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "471a535b-0510-4ea6-88b5-5d8475db6776",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "dd017350-2153-45c2-acb3-71e1420e9a9f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "bc22fb05-c554-45fc-b70f-95bf561b7863",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "8719b527-80b5-4445-a2fe-69810b691a86",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d1facebd-12f8-497a-94c3-81662ce88f84",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ab87ae06-b86b-40e4-a055-a52a3d5313b0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "51c931bd-ab7f-418e-9824-980ebcf036ab",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "f3f3de48-2eea-4b0a-8894-dc65a10d893c",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "ee046dc4-0c8b-4898-b65f-aa83e162c495",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:17Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf",
                "resourceVersion": "19662",
                "uid": "12a5b2f1-6f4d-469c-a668-a9bb4ed19509"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:14Z",
                        "lastUpdateTime": "2026-04-03T00:12:14Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:18Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:18Z",
                        "lastUpdateTime": "2026-04-03T00:12:19Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:34Z",
                        "lastUpdateTime": "2026-04-03T00:12:34Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:34Z",
                "lastUpdateTime": "2026-04-03T00:12:34Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "91811713-76f0-4309-a38d-309dd58d2d19",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "c9ecd12e-ffcc-4848-ad03-4016fa5d2f28",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "d05b9b7a-a9ba-432d-8e4e-4a03f51d500a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8b75eab2-c981-4eec-b5ce-54bb868f61b4",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "94d1b27b-0889-4f1c-b6cb-92ccafe77df6",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "56c9b3d4-e5e4-4a00-a154-751ee1d81194",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "dd67b479-b494-4055-8bed-5551afdcb923",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
